Static task
static1
Behavioral task
behavioral1
Sample
6cde6137a0f65c08174859b460fab7eae08b00252a3c3a3c8b9428fcf5d48b7c.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
6cde6137a0f65c08174859b460fab7eae08b00252a3c3a3c8b9428fcf5d48b7c.exe
Resource
win10v2004-20231023-en
General
-
Target
6cde6137a0f65c08174859b460fab7eae08b00252a3c3a3c8b9428fcf5d48b7c
-
Size
46KB
-
MD5
abfa1e05da7ff0d62ad7ef84b3a6da2c
-
SHA1
81745f88a14e9efcf0bafdc914d447ddd5dfe773
-
SHA256
6cde6137a0f65c08174859b460fab7eae08b00252a3c3a3c8b9428fcf5d48b7c
-
SHA512
7f7591abac0e08bdb64268fbe954aab8df793af13bff65ad5565688eab9dd0924375ba1223c829094c2e5c387d67380c0f829ef3df688c0b3304e702e4c8481c
-
SSDEEP
768:XUuSlEGoyUw29Sd2sPP3lLuzZPKqRtIHa3HOMM:X32UwME2sPP3lLuBZRtI63OMM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6cde6137a0f65c08174859b460fab7eae08b00252a3c3a3c8b9428fcf5d48b7c
Files
-
6cde6137a0f65c08174859b460fab7eae08b00252a3c3a3c8b9428fcf5d48b7c.exe windows:4 windows x86 arch:x86
7696ba236eb564382e150c8a278455cb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateThread
CreateToolhelp32Snapshot
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
FreeLibrary
GetCommandLineA
GetCurrentProcess
GetLastError
GetModuleHandleA
GetProcAddress
GetProcessAffinityMask
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
OpenProcess
Process32First
Process32Next
SetPriorityClass
SetProcessAffinityMask
SetUnhandledExceptionFilter
Sleep
TlsGetValue
VirtualProtect
VirtualQuery
msvcrt
_strdup
_stricoll
__getmainargs
__mb_cur_max
__p__environ
__p__fmode
__set_app_type
_cexit
_errno
_fpreset
_fullpath
_iob
_isctype
_onexit
_pctype
_setmode
abort
atexit
calloc
free
fwrite
malloc
mbstowcs
memcpy
puts
realloc
setlocale
signal
strcoll
strlen
tolower
vfprintf
wcstombs
psapi
EnumProcesses
user32
DispatchMessageA
GetForegroundWindow
GetMessageA
GetWindowThreadProcessId
SetWinEventHook
TranslateMessage
UnhookWinEvent
Sections
.text Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
/4 Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 128B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
/14 Size: 512B - Virtual size: 56B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/29 Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/41 Size: 512B - Virtual size: 303B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/55 Size: 512B - Virtual size: 456B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/67 Size: 512B - Virtual size: 56B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ