Static task
static1
Behavioral task
behavioral1
Sample
6e3cb2bdcf345457274ac47cf9269435f409c9f66e5743bd8b64425907cf7324.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
6e3cb2bdcf345457274ac47cf9269435f409c9f66e5743bd8b64425907cf7324.exe
Resource
win10-20231129-en
General
-
Target
6e3cb2bdcf345457274ac47cf9269435f409c9f66e5743bd8b64425907cf7324
-
Size
250KB
-
MD5
d240b0bec22b0025b13457cc05f1cde3
-
SHA1
1b4a00f7e1ce1fd4a9c01887b15e6a8e1b49ea8f
-
SHA256
6e3cb2bdcf345457274ac47cf9269435f409c9f66e5743bd8b64425907cf7324
-
SHA512
10034d83376a1c1288a51be00415f0a93160b03f8bb178b72d95b84e08246748f468be3d5c69550e98324a7f59cfc919a93d12965bbe7ebcf8f29b45005d9c75
-
SSDEEP
3072:e2vSvzZam/HU7jacpwCgNRIfKnZapPwOk4Ll9n:d4PfUn7xf6Mp1n
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6e3cb2bdcf345457274ac47cf9269435f409c9f66e5743bd8b64425907cf7324
Files
-
6e3cb2bdcf345457274ac47cf9269435f409c9f66e5743bd8b64425907cf7324.exe windows:5 windows x86 arch:x86
1b8b1a328b1c62fc7cde32d1ecc91033
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetNativeSystemInfo
FindFirstChangeNotificationW
TlsGetValue
SystemTimeToTzSpecificLocalTime
GlobalAddAtomA
EndUpdateResourceW
InterlockedIncrement
GetCurrentProcess
SetComputerNameW
GetComputerNameW
SleepEx
GetModuleHandleW
GetTickCount
GetConsoleAliasesA
FormatMessageA
EnumTimeFormatsW
GlobalAlloc
GlobalFindAtomA
LoadLibraryW
SizeofResource
GetConsoleAliasExesLengthW
SetConsoleCursorPosition
CreateFileW
CreateJobObjectA
GetDateFormatW
InterlockedExchange
GetLastError
SetLastError
BackupRead
ReadConsoleOutputCharacterA
GetProcAddress
VirtualAlloc
BeginUpdateResourceW
EnumDateFormatsExA
SetTimerQueueTimer
InterlockedExchangeAdd
CreateFileMappingW
FindFirstVolumeMountPointW
HeapLock
FoldStringA
FindFirstVolumeMountPointA
OpenSemaphoreW
SetFileShortNameA
GetVersionExA
TerminateJobObject
GetWindowsDirectoryW
LCMapStringA
GetFullPathNameW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
Sleep
ExitProcess
GetCommandLineA
GetStartupInfoA
WriteFile
GetStdHandle
GetModuleFileNameA
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
InterlockedDecrement
HeapSize
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
IsDebuggerPresent
HeapFree
DeleteCriticalSection
LoadLibraryA
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapAlloc
HeapReAlloc
RtlUnwind
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
CloseHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CreateFileA
RaiseException
gdi32
SetDeviceGammaRamp
Sections
.text Size: 94KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 133KB - Virtual size: 133KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ