Static task
static1
Behavioral task
behavioral1
Sample
6b4b47e148736428128c9c11abe154101ccd52d3df61f9f2dda89c6030e952c5.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
6b4b47e148736428128c9c11abe154101ccd52d3df61f9f2dda89c6030e952c5.exe
Resource
win10v2004-20231025-en
General
-
Target
6b4b47e148736428128c9c11abe154101ccd52d3df61f9f2dda89c6030e952c5
-
Size
1.3MB
-
MD5
7fc12d7c0034f93608b27bec245b92fa
-
SHA1
834625bcd357b16c7f4624f479af4dada4483603
-
SHA256
6b4b47e148736428128c9c11abe154101ccd52d3df61f9f2dda89c6030e952c5
-
SHA512
5a6de3db2c2c2e6a2c9c3e521e67a39f9ce2c112df0ae87bb37f27e493702b4507d1e87ab4fca6d6f0b348b5b955302ce7ae3494a756048b51d39ce779115940
-
SSDEEP
24576:THrGEXhnwJzsJYKbe4Qxigqb89Fx6EEdAJ1MeLDHQC+qWW54Sa:wwe4Qotb4hx54
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6b4b47e148736428128c9c11abe154101ccd52d3df61f9f2dda89c6030e952c5
Files
-
6b4b47e148736428128c9c11abe154101ccd52d3df61f9f2dda89c6030e952c5.exe windows:4 windows x86
9fba9c934295c67e8ff0bd69ee491011
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
timeGetTime
kernel32
HeapFree
HeapReAlloc
VirtualAlloc
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RaiseException
ExitProcess
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetHandleCount
GetFileType
GetACP
IsValidCodePage
VirtualFree
HeapDestroy
HeapCreate
GetConsoleCP
HeapAlloc
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount
GetSystemTimeAsFileTime
SetStdHandle
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetConsoleOutputCP
WriteConsoleW
RtlUnwind
SetErrorMode
SetEndOfFile
FlushFileBuffers
WritePrivateProfileStringA
GetThreadLocale
GetOEMCP
GetCPInfo
GlobalFlags
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
GetSystemDirectoryA
TlsAlloc
InitializeCriticalSection
GlobalHandle
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
InterlockedIncrement
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GetCurrentProcessId
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
InterlockedDecrement
GetModuleFileNameW
SetLastError
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
MulDiv
QueryPerformanceCounter
QueryPerformanceFrequency
ReadFile
GetSystemInfo
GetProcessAffinityMask
GetCurrentThread
SetFilePointer
DeleteFileA
GetComputerNameA
DeviceIoControl
CreateMutexA
ReleaseMutex
GetCurrentProcess
GlobalAlloc
GlobalReAlloc
GlobalFree
GlobalSize
lstrcmpiA
CompareStringA
GetVersion
MultiByteToWideChar
InterlockedExchange
GetWindowsDirectoryA
LoadLibraryA
FreeLibrary
lstrcatA
lstrlenA
WinExec
lstrcpyA
GetVersionExA
GetTempPathA
GetStdHandle
GetModuleHandleA
GetModuleFileNameA
GetProcAddress
GlobalMemoryStatus
WriteConsoleA
CreateFileA
WriteFile
GetLastError
CreateThread
SetThreadPriority
Sleep
ExitThread
WaitForSingleObject
CloseHandle
GetCurrentDirectoryA
SetCurrentDirectoryA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetConsoleMode
user32
UnregisterClassA
GetSysColorBrush
PostQuitMessage
DestroyMenu
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
EnableMenuItem
CheckMenuItem
GetDesktopWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
GetWindowThreadProcessId
RegisterWindowMessageA
LoadIconA
WinHelpA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
TrackPopupMenu
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
PtInRect
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
GetWindowPlacement
UnhookWindowsHookEx
SetPropA
GetCapture
GetActiveWindow
SetActiveWindow
GetPropA
RemovePropA
PostMessageA
GetWindowTextLengthA
GetWindowTextA
GetFocus
GetParent
SetWindowPos
SetFocus
IsWindowEnabled
ShowWindow
MoveWindow
GetDlgCtrlID
IsWindow
SetWindowTextA
GetWindowLongA
IsDialogMessageA
SetDlgItemTextA
SetDlgItemInt
SendDlgItemMessageA
GetDlgItem
GetWindow
EndPaint
BeginPaint
ScreenToClient
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
wsprintfA
EmptyClipboard
SetClipboardData
CloseClipboard
GetDC
ReleaseDC
SetWindowLongA
LoadCursorA
CopyIcon
SetCursor
LoadImageA
GetSysColor
KillTimer
SetTimer
IsIconic
DrawIcon
OffsetRect
MessageBoxA
GetSystemMetrics
ClientToScreen
ModifyMenuA
AppendMenuA
CreatePopupMenu
GetWindowDC
EnableWindow
OpenClipboard
GetClientRect
GetWindowRect
SendMessageA
LoadBitmapA
gdi32
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
DeleteObject
CreateBitmap
GetObjectA
GetClipBox
SetMapMode
SetTextColor
SetBkMode
SetBkColor
RestoreDC
SaveDC
GetSystemPaletteEntries
SelectPalette
RealizePalette
GetDIBits
GetDeviceCaps
CreatePalette
CreateFontIndirectA
GetStockObject
CreateFontA
GetTextExtentPoint32A
GetPixel
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RevertToSelf
AccessCheck
IsValidSecurityDescriptor
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
RegSetValueExA
RegCreateKeyExA
RegEnumKeyA
RegDeleteKeyA
RegQueryValueExA
RegOpenKeyA
OpenSCManagerA
ControlService
StartServiceA
OpenServiceA
DeleteService
CreateServiceA
CloseServiceHandle
RegOpenKeyExA
RegQueryValueA
RegCloseKey
InitializeSecurityDescriptor
FreeSid
AllocateAndInitializeSid
OpenProcessToken
OpenThreadToken
ImpersonateSelf
shell32
ShellExecuteA
shlwapi
PathFindFileNameA
PathFindExtensionA
ole32
CoInitializeEx
CoInitializeSecurity
CoCreateInstance
CoUninitialize
CoInitialize
oleaut32
SysFreeString
VariantInit
SysAllocString
VariantClear
VariantChangeType
SysStringLen
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 632KB - Virtual size: 630KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CONST Size: 4KB - Virtual size: 31B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 488KB - Virtual size: 508KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE