Static task
static1
Behavioral task
behavioral1
Sample
006fa04e202f3b578680ab6dfef95395.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
006fa04e202f3b578680ab6dfef95395.exe
Resource
win10v2004-20231222-en
General
-
Target
006fa04e202f3b578680ab6dfef95395
-
Size
1.1MB
-
MD5
006fa04e202f3b578680ab6dfef95395
-
SHA1
73fba67d3fff4570183955242b7392e77f091447
-
SHA256
5862d73082ccbdb8f167f4d208d5c1095eec16cdca5bc9a8f6410e13a6c3db19
-
SHA512
7491d10978f04a4ef6c4b81783bc160f2ffddc565b61e264dd3277cf841e02eda01f1c40a555f5c3f8ddc8cf0d21c5fad12cf81c6f80b201a15e621241ce243b
-
SSDEEP
3072:4LcOJ/v6+0hzWcQ/LYynMVb9vEhuTbhMUj7WAk4/5DGKl:ALBv6+6zUgbpCuTtNqAk6D9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 006fa04e202f3b578680ab6dfef95395
Files
-
006fa04e202f3b578680ab6dfef95395.exe windows:4 windows x86 arch:x86
a57ea20fe1dc24f8f408749dcae996df
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
ExitProcess
LoadLibraryA
WinExec
CreateThread
GetCurrentThreadId
HeapAlloc
GetFileAttributesA
SetUnhandledExceptionFilter
GetWindowsDirectoryA
GetCommandLineA
GetModuleHandleA
GetStartupInfoA
GetProcAddress
HeapFree
GetLastError
lstrcpyA
SetLastError
GetTempPathA
lstrcmpiA
GetTickCount
FindResourceA
LoadResource
GetSystemDirectoryA
lstrcatA
FindFirstFileA
LocalFileTimeToFileTime
SetFileTime
SizeofResource
WriteFile
FreeResource
MoveFileA
DeleteFileA
GetModuleFileNameA
CreateFileA
SetFilePointer
ReadFile
OutputDebugStringA
MultiByteToWideChar
WideCharToMultiByte
GetCurrentProcess
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
lstrlenA
Sleep
CreateDirectoryA
user32
LoadCursorA
RegisterClassExA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
DispatchMessageA
DefWindowProcA
PostQuitMessage
wsprintfA
LoadIconA
GetDesktopWindow
GetTopWindow
GetWindowRect
WindowFromPoint
CreateWindowExA
GetCursorPos
IsWindow
SetForegroundWindow
GetWindow
GetClassNameA
GetWindowTextA
PostThreadMessageA
SendMessageA
SetCursorPos
mouse_event
GetInputState
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegSetValueExA
GetUserNameA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
CreateServiceA
OpenSCManagerA
SetFileSecurityA
GetSecurityDescriptorControl
SetSecurityDescriptorDacl
AddAccessAllowedAce
AddAce
EqualSid
GetAce
InitializeAcl
GetLengthSid
GetAclInformation
GetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetFileSecurityA
LookupAccountNameA
StartServiceA
OpenServiceA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
CloseServiceHandle
msvcrt
_except_handler3
rand
strchr
strstr
realloc
malloc
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__fmode
__set_app_type
_controlfp
__p__commode
??2@YAPAXI@Z
memset
strlen
??3@YAXPAX@Z
memcpy
__CxxFrameHandler
netapi32
NetApiBufferFree
NetUserGetLocalGroups
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 126KB - Virtual size: 126KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ