Static task
static1
Behavioral task
behavioral1
Sample
06e75141ef460ff4228aeb0f2542dc10.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
06e75141ef460ff4228aeb0f2542dc10.exe
Resource
win10v2004-20231215-en
General
-
Target
06e75141ef460ff4228aeb0f2542dc10
-
Size
157KB
-
MD5
06e75141ef460ff4228aeb0f2542dc10
-
SHA1
d7a64e8eda7bc43080ff2dab42ca568e2e188d84
-
SHA256
784cafbaa4466badaa2f17cdc5432659780a324cfb5e786c84c10d2ce143ea4e
-
SHA512
b88f010a1817ea0bbfbb113f254ca62c6cf283cf7f2a244c061279c88b95f39f0ac437184ec1995a697d20ee7e72caf5d61360f544de872bafbaa0cd8bdb5f6f
-
SSDEEP
3072:jpaSoMpk/T0cxIOPMg+M6kUiwKzs6REEigKb:tzp7ROPMJmL1K
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 06e75141ef460ff4228aeb0f2542dc10
Files
-
06e75141ef460ff4228aeb0f2542dc10.exe windows:5 windows x86 arch:x86
495671fc023d8f6376d79e5a17aeebc4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc100u
ord6156
ord10725
ord12557
ord5276
ord2339
ord11116
ord3491
ord2952
ord2951
ord2852
ord11159
ord7871
ord1310
ord290
ord280
ord903
ord306
ord4290
ord1282
ord13342
ord1734
ord880
ord1987
ord4139
ord12186
ord4355
ord8273
ord1266
ord3763
ord2844
ord8393
ord5855
ord3446
ord2185
ord4356
ord5862
ord5801
ord6870
ord5558
ord12610
ord2418
ord3397
ord11210
ord11940
ord2509
ord12948
ord7006
ord12951
ord4802
ord4360
ord897
ord6243
ord1479
ord1312
ord296
ord11494
ord7911
ord10045
ord6247
ord8112
ord11244
ord12724
ord3402
ord11081
ord8277
ord14060
ord14059
ord14132
ord14149
ord14145
ord14147
ord14148
ord14146
ord7385
ord9333
ord2884
ord2887
ord1905
ord3380
ord1934
ord5828
ord381
ord2756
ord2980
ord2981
ord9525
ord10412
ord10058
ord8179
ord11163
ord8347
ord2417
ord12606
ord5556
ord11123
ord10081
ord6711
ord788
ord1212
ord3261
ord6141
ord891
ord1293
ord4087
ord7615
ord2457
ord11923
ord10894
ord13029
ord8115
ord8345
ord7633
ord13116
ord11515
ord3627
ord948
ord11209
ord11240
ord7391
ord11228
ord13305
ord13388
ord7109
ord13382
ord2665
ord3992
ord14067
ord5143
ord3999
ord4416
ord4383
ord4379
ord4413
ord4434
ord4392
ord4421
ord4430
ord4400
ord4404
ord4408
ord4396
ord4425
ord4388
ord1519
ord1512
ord1514
ord1508
ord4511
ord1501
ord5261
ord3416
ord12753
ord13568
ord13571
ord13569
ord13572
ord13567
ord13570
ord7179
ord13380
ord11246
ord11469
ord13267
ord10937
ord2853
ord10976
ord14162
ord1739
ord7126
ord11864
ord3625
ord3684
ord8530
ord13387
ord7108
ord13381
ord11477
ord11476
ord2164
ord9447
ord4744
ord13854
ord7176
ord11784
ord11845
ord9498
ord11236
ord7548
ord6869
ord7624
ord8346
ord9328
ord7393
ord4792
ord6922
ord6932
ord6931
ord4623
ord4794
ord4645
ord5118
ord4901
ord8483
ord5115
ord4923
ord4642
ord286
ord2089
ord902
ord1298
ord6117
ord1300
msvcr100
__CxxFrameHandler3
memcpy
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_controlfp_s
_invoke_watson
_except_handler4_common
?terminate@@YAXXZ
_onexit
_lock
__dllonexit
_unlock
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
wcsstr
_time64
fclose
srand
fprintf
fopen_s
rand
memmove
??0exception@std@@QAE@ABV01@@Z
??0exception@std@@QAE@ABQBD@Z
??1exception@std@@UAE@XZ
?what@exception@std@@UBEPBDXZ
_CxxThrowException
kernel32
GetStartupInfoW
EncodePointer
DecodePointer
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
HeapSetInformation
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
InterlockedCompareExchange
Sleep
InterlockedExchange
GetWindowsDirectoryW
lstrlenW
WinExec
LoadLibraryW
WideCharToMultiByte
FreeLibrary
GetComputerNameW
GetCurrentThreadId
IsProcessorFeaturePresent
GetVolumeInformationW
user32
SetTimer
ScreenToClient
GetWindowRect
RegisterWindowMessageW
KillTimer
GetParent
LoadCursorW
MessageBeep
PtInRect
GetDC
InflateRect
CopyIcon
InvalidateRect
ReleaseDC
SetWindowLongW
RedrawWindow
DestroyCursor
GetSysColor
IsWindow
GetMessagePos
IsIconic
DrawIcon
GetClientRect
LoadIconW
GetSystemMetrics
SendMessageW
EnableWindow
SetCursor
gdi32
CreateFontIndirectW
GetObjectW
GetStockObject
GetTextExtentPoint32W
advapi32
RegCloseKey
RegOpenKeyExW
RegQueryValueW
shell32
ShellExecuteW
comctl32
InitCommonControlsEx
msvcp100
?_Xlength_error@std@@YAXPBD@Z
?_BADOFF@std@@3_JB
?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z
??5?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV01@AAJ@Z
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE@XZ
??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IAE@XZ
?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEPADXZ
?setp@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXPAD00@Z
?setp@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXPAD0@Z
?epptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IBEPADXZ
?setg@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXPAD00@Z
?egptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IBEPADXZ
?pptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IBEPADXZ
?gptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IBEPADXZ
?eback@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IBEPADXZ
??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UAE@XZ
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@K@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@J@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@I@Z
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEXABVlocale@2@@Z
?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEHXZ
?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEPAV12@PAD_J@Z
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPBD_J@Z
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPAD_J@Z
?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEHXZ
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JXZ
?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAEXXZ
?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAEXXZ
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAE@XZ
?_Xout_of_range@std@@YAXPBD@Z
Sections
.text Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 101KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ