Static task
static1
Behavioral task
behavioral1
Sample
06a6145cddf7db1efbe6280a57880111.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
06a6145cddf7db1efbe6280a57880111.exe
Resource
win10v2004-20231215-en
General
-
Target
06a6145cddf7db1efbe6280a57880111
-
Size
132KB
-
MD5
06a6145cddf7db1efbe6280a57880111
-
SHA1
27d5d9e4ae4f47f28b3b9a70163d9c86eeda9edf
-
SHA256
e783df54ae271c64196c7247349271f58eef20f87115283b9af834e86dd18d89
-
SHA512
80b2d3ddd92470eed98613d0ec32262d98a68a10af07bee31385c5d2e471a9f63dab2e5257c7823a56cb5f64cd5b104b8cda612b7b7e76b0c768425cebb0e602
-
SSDEEP
3072:u9nq8Y0Sn7auCJ0lmmHe7IKIbtd7pAEo:fn7auU0e7IKIbtd7pAEo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 06a6145cddf7db1efbe6280a57880111
Files
-
06a6145cddf7db1efbe6280a57880111.exe windows:4 windows x86 arch:x86
3efb2b9213f27567eb90729ab4d9e1d6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLogicalDriveStringsA
SuspendThread
Sleep
GetDriveTypeA
CreateMutexA
SetVolumeLabelA
GetVolumeInformationA
GetSystemDirectoryA
FindClose
CreateFileA
MultiByteToWideChar
ExitThread
WinExec
FlushFileBuffers
WriteFile
ReadFile
GetLastError
LocalAlloc
LocalFree
OpenMutexA
CloseHandle
GetVersionExA
GetCurrentProcess
SetPriorityClass
GetExitCodeThread
TerminateThread
CreateThread
ResumeThread
FindFirstFileA
FindNextFileA
GetStringTypeA
SetFilePointer
GetProcAddress
LCMapStringA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
WriteConsoleA
GetOEMCP
GetACP
GetCPInfo
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
WideCharToMultiByte
HeapAlloc
LCMapStringW
RtlUnwind
GetStringTypeW
DeviceIoControl
ExitProcess
HeapFree
TerminateProcess
LoadLibraryA
SetStdHandle
user32
GetMessageA
EnableWindow
DestroyIcon
LoadCursorA
GetSystemMetrics
LoadImageA
CreateWindowExA
wsprintfA
DispatchMessageA
TranslateMessage
GetClassNameA
RegisterClassExA
FindWindowA
PostMessageA
MessageBoxA
LoadIconA
GetDesktopWindow
GetWindowRect
CopyRect
OffsetRect
SetWindowPos
SetActiveWindow
EndDialog
GetDlgItem
PostQuitMessage
GetCursorPos
LoadMenuA
GetSubMenu
CheckMenuItem
SetMenuDefaultItem
SetForegroundWindow
TrackPopupMenu
DestroyWindow
DialogBoxParamA
EnumWindows
DestroyMenu
DefWindowProcA
KillTimer
SetTimer
SendMessageA
SendMessageTimeoutA
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegSetValueExA
shell32
Shell_NotifyIconA
ExtractIconExA
ShellExecuteA
ole32
CoUninitialize
CoInitializeEx
CoInitializeSecurity
setupapi
SetupDiGetClassDevsW
SetupDiOpenClassRegKey
SetupDiCallClassInstaller
SetupDiGetDeviceInterfaceDetailA
SetupDiGetClassDevsA
SetupDiEnumDeviceInfo
SetupDiSetClassInstallParamsW
SetupDiGetDeviceRegistryPropertyW
CM_Get_DevNode_Status
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInterfaces
comctl32
ImageList_ReplaceIcon
ImageList_Create
Sections
.text Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ