Static task
static1
Behavioral task
behavioral1
Sample
1b6447634edef03fc61ce55db445b7d6.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
1b6447634edef03fc61ce55db445b7d6.exe
Resource
win10v2004-20231201-en
General
-
Target
1b6447634edef03fc61ce55db445b7d6
-
Size
293KB
-
MD5
1b6447634edef03fc61ce55db445b7d6
-
SHA1
2abe840baef1b7448aaa1fe23185649db3c870c8
-
SHA256
3d040d170ebfeff2a26bf5d9fa88bbddf0cd0f9bb66412cb68b3b11580d5cc6c
-
SHA512
b392c2e6c79c206c7d8a96fd2a2206cda5ce6db92807f517a6fb24b6bda21725a51fbd5dc0b039f160cd4069e31da843019927c1c18430dd4504543a5c8120dc
-
SSDEEP
6144:7LoYiRV6tyYQ6wN4FVUlaP0DgvrmXL4Y2uxrDU+M:7cYU6t4OF6lakI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1b6447634edef03fc61ce55db445b7d6
Files
-
1b6447634edef03fc61ce55db445b7d6.exe windows:6 windows x64 arch:x64
85876006c2ecd2e9a446192cb4f7518c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
SystemFunction036
kernel32
DeleteFileW
HeapFree
GetLastError
SetLastError
GetModuleFileNameW
CopyFileExW
Sleep
GlobalLock
GlobalSize
GlobalUnlock
EnterCriticalSection
LeaveCriticalSection
GlobalAlloc
GlobalFree
CreateSymbolicLinkW
AddVectoredExceptionHandler
SetThreadStackGuarantee
HeapAlloc
GetProcessHeap
HeapReAlloc
lstrlenW
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
GetModuleHandleA
GetProcAddress
TlsGetValue
TlsSetValue
AcquireSRWLockShared
ReleaseSRWLockShared
GetEnvironmentVariableW
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentThread
RtlCaptureContext
RtlLookupFunctionEntry
ReleaseMutex
WaitForSingleObjectEx
LoadLibraryA
CreateMutexA
CloseHandle
GetStdHandle
GetConsoleMode
WriteFile
WriteConsoleW
TlsAlloc
GetModuleHandleW
FormatMessageW
CreateDirectoryW
CreateFileW
GetFileInformationByHandle
DeviceIoControl
InitializeCriticalSection
TryEnterCriticalSection
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
RtlVirtualUnwind
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
ole32
CoTaskMemFree
shell32
SHGetKnownFolderPath
user32
SetClipboardData
EmptyClipboard
GetClipboardData
OpenClipboard
CloseClipboard
ws2_32
WSACleanup
vcruntime140
__current_exception
memset
__C_specific_handler
memmove
memcmp
memcpy
__current_exception_context
api-ms-win-crt-runtime-l1-1-0
_initterm_e
__p___argv
__p___argc
_seh_filter_exe
_exit
_c_exit
_register_onexit_function
_crt_atexit
terminate
_set_app_type
_initialize_onexit_table
_cexit
exit
_initterm
_get_initial_narrow_environment
_initialize_narrow_environment
_configure_narrow_argv
_register_thread_local_exe_atexit_callback
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-stdio-l1-1-0
__p__commode
_set_fmode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-heap-l1-1-0
_set_new_mode
Sections
.text Size: 237KB - Virtual size: 236KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 664B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 832B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ