Static task
static1
Behavioral task
behavioral1
Sample
06a12953a1cd43d4936cc6416a2dfa35.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
06a12953a1cd43d4936cc6416a2dfa35.exe
Resource
win10v2004-20231215-en
General
-
Target
06a12953a1cd43d4936cc6416a2dfa35
-
Size
303KB
-
MD5
06a12953a1cd43d4936cc6416a2dfa35
-
SHA1
b7e845b2d4803d14e855b815e1687accc1a973bb
-
SHA256
f1563ef646410f0ebbbe02b2e6e13312373ea1ff03a2d2b0fe1f2af69a3b679b
-
SHA512
e22940bd3e48ec0ef5c6ba58e768801d6b09699a7c0535349ec36c95f2cb28e4ab4dd1577ffeb8dbacbdebe2510450381a008abcb080929d64a625b22a801726
-
SSDEEP
3072:2ktwfjZkwfjZQtVch+XoVKUhSXVrbfUzVXp7LVpfm5hOebuvGlwt:2TvAVchTK/hfU/7nqOv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 06a12953a1cd43d4936cc6416a2dfa35
Files
-
06a12953a1cd43d4936cc6416a2dfa35.exe windows:0 windows x86 arch:x86
2c351a01263c1e2a785627e6a6300658
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AddAtomA
BaseCleanupAppcompatCacheSupport
ChangeTimerQueueTimer
CmdBatNotification
CommConfigDialogW
CompareStringA
ConvertDefaultLocale
ConvertThreadToFiber
CopyFileExA
CopyFileExW
CreateDirectoryExA
CreateFileA
CreateJobObjectW
CreateMutexA
CreateMutexW
CreateProcessInternalW
CreateSocketHandle
CreateTapePartition
CreateThread
CreateVirtualBuffer
DebugSetProcessKillOnExit
DecodeSystemPointer
DeleteTimerQueue
DisableThreadLibraryCalls
DisconnectNamedPipe
EncodePointer
EnumDateFormatsExA
EnumLanguageGroupLocalesA
EnumResourceLanguagesA
EnumSystemCodePagesW
EnumSystemGeoID
EnumSystemLocalesW
EnumTimeFormatsA
EnumTimeFormatsW
EnumUILanguagesA
ExpungeConsoleCommandHistoryA
FatalExit
FileTimeToDosDateTime
FindAtomA
FindFirstChangeNotificationW
GetBinaryTypeW
GetCPInfo
GetCPInfoExW
GetCommConfig
GetCommandLineA
GetCompressedFileSizeA
GetConsoleAliasExesLengthA
GetConsoleAliasExesLengthW
GetConsoleAliasesW
GetConsoleInputExeNameA
GetConsoleTitleW
GetDriveTypeA
GetEnvironmentStringsA
GetEnvironmentVariableA
GetFileType
GetHandleInformation
GetLinguistLangSize
GetModuleFileNameA
GetModuleHandleA
GetNumaNodeProcessorMask
GetPrivateProfileIntA
GetPrivateProfileSectionNamesA
GetPrivateProfileSectionW
GetProcAddress
GetProcessIoCounters
GetProcessTimes
GetSystemDefaultLangID
GetSystemDefaultUILanguage
GetThreadSelectorEntry
GetThreadTimes
GetUserDefaultLCID
GetVersion
GetVolumeInformationA
GetVolumeNameForVolumeMountPointA
GetVolumePathNamesForVolumeNameW
GlobalAddAtomW
GlobalGetAtomNameW
GlobalMemoryStatus
GlobalWire
HeapFree
HeapReAlloc
HeapUnlock
HeapValidate
IsBadWritePtr
IsValidUILanguage
LoadLibraryA
LocalAlloc
LocalHandle
LocalReAlloc
LocalSize
LockFileEx
NumaVirtualQueryNode
OpenSemaphoreA
OpenThread
OpenWaitableTimerW
PeekConsoleInputW
Process32First
QueryDepthSList
QueryDosDeviceW
ReadConsoleW
ReadDirectoryChangesW
RegisterWaitForInputIdle
RegisterWowExec
ReleaseMutex
ReleaseSemaphore
RemoveLocalAlternateComputerNameW
SearchPathA
SetClientTimeZoneInformation
SetCommMask
SetComputerNameExW
SetConsoleInputExeNameW
SetConsoleKeyShortcuts
SetConsoleLocalEUDC
SetConsoleNumberOfCommandsW
SetCriticalSectionSpinCount
SetDefaultCommConfigA
SetEndOfFile
SetEvent
SetFileShortNameW
SetInformationJobObject
SetLastConsoleEventActive
SetProcessPriorityBoost
SetThreadIdealProcessor
SetThreadLocale
SetTimerQueueTimer
SetUnhandledExceptionFilter
SetUserGeoID
SetVolumeMountPointA
ShowConsoleCursor
TlsAlloc
UTUnRegister
UnregisterWait
VerLanguageNameA
VirtualAllocEx
WriteConsoleOutputCharacterA
WritePrivateProfileSectionW
WritePrivateProfileStructA
WriteProcessMemory
lstrcatA
lstrcpynW
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ