Ext_RunDLL
Static task
static1
Behavioral task
behavioral1
Sample
f6c275dfdd36bb19d4ae7fcc80d2ed55.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f6c275dfdd36bb19d4ae7fcc80d2ed55.exe
Resource
win10v2004-20231215-en
General
-
Target
f6c275dfdd36bb19d4ae7fcc80d2ed55
-
Size
1014KB
-
MD5
f6c275dfdd36bb19d4ae7fcc80d2ed55
-
SHA1
b116291debdd712530107a363d519d79db31b16e
-
SHA256
d8a8fb24cba033969697765902beedd01f242a195b64036d9eb7806256711a1a
-
SHA512
9718a3b0ebbb44f10a9715e698a696b9b8a71727767e3878e6e019fbf8b5d8332673464bd453fcdf94111973e8620749f800e5e2d4211890fdb77a6404d540ed
-
SSDEEP
24576:1XxktAawuLWXZa+dMxE3TAf0RENJqNGE7tNH7ezuK:UxWXZaN2Af0REyNGEb8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f6c275dfdd36bb19d4ae7fcc80d2ed55
Files
-
f6c275dfdd36bb19d4ae7fcc80d2ed55.exe windows:6 windows x86 arch:x86
6426505da2922278825eeea050c45975
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
GetShortPathNameA
K32GetModuleFileNameExA
CloseHandle
FindResourceA
LoadResource
SizeofResource
LockResource
CreateFileA
SetFilePointer
SetEndOfFile
WriteFile
GetProcAddress
GetModuleHandleA
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
WaitForSingleObject
ExpandEnvironmentStringsA
GetExitCodeThread
FreeLibrary
VirtualFreeEx
CreateThread
GetLastError
OpenProcess
Sleep
Process32Next
Module32Next
OutputDebugStringA
Process32First
WriteConsoleW
HeapReAlloc
HeapSize
SetFilePointerEx
CreateFileW
GetTimeZoneInformation
GetConsoleCP
FlushFileBuffers
SetStdHandle
GetProcessHeap
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
ReadConsoleW
GetConsoleMode
ReadFile
GetStringTypeW
LCMapStringW
CompareStringW
GetFileType
CreateToolhelp32Snapshot
SystemTimeToFileTime
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetComputerNameA
MultiByteToWideChar
GlobalAlloc
GlobalFree
WideCharToMultiByte
FileTimeToSystemTime
FileTimeToLocalFileTime
lstrcmpiA
GetProcessTimes
EncodePointer
RaiseException
SetLastError
RtlUnwind
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
FindClose
FindFirstFileExW
FindNextFileW
SystemTimeToTzSpecificLocalTime
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
GetStdHandle
GetCommandLineA
GetCommandLineW
GetACP
HeapFree
HeapAlloc
GetLocalTime
user32
SetPropA
LoadStringA
PostQuitMessage
EndDialog
CreateDialogParamA
DispatchMessageA
TranslateMessage
GetWindowThreadProcessId
GetMessageA
FindWindowA
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ws2_32
WSAStartup
gethostbyname
WSACleanup
inet_addr
inet_ntoa
shlwapi
PathFileExistsA
PathRemoveFileSpecA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
winhttp
WinHttpReceiveResponse
WinHttpConnect
WinHttpSetTimeouts
WinHttpCloseHandle
WinHttpOpenRequest
WinHttpOpen
WinHttpQueryDataAvailable
WinHttpReadData
WinHttpQueryHeaders
WinHttpAddRequestHeaders
WinHttpSendRequest
rpcrt4
UuidCreateSequential
iphlpapi
SendARP
GetAdaptersInfo
advapi32
RegOpenKeyExA
RegEnumKeyExA
RegQueryValueExA
Exports
Exports
Sections
.text Size: 226KB - Virtual size: 226KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 288B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 709KB - Virtual size: 708KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ