Static task
static1
Behavioral task
behavioral1
Sample
06efeefc879263878df27be94f814dfc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
06efeefc879263878df27be94f814dfc.exe
Resource
win10v2004-20231215-en
General
-
Target
06efeefc879263878df27be94f814dfc
-
Size
355KB
-
MD5
06efeefc879263878df27be94f814dfc
-
SHA1
fdff1e1de57bf93e3584d2b8f368cb2e2fd87fc0
-
SHA256
840356340c1f809330c14178e3f43ca8e064a803910a2d57cc2c86e193407ec2
-
SHA512
6d3ff255430b0e77b656767b2bacde816a6edd04decabfcf16bdb2f9dac71840b83ccca179aa46b073bc72943e38981e8167241e9fb932bfd4328827a971f409
-
SSDEEP
6144:pQSvdjfHxSlGPQBaZ+BqhMXAy6fYv2SeJ3eB8fvmKNNcQ5ta6gKv5R3L/XWlpWzk:pd9fR9QI0Ay6fYvzEOe2KNSQ6l83zBzk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 06efeefc879263878df27be94f814dfc
Files
-
06efeefc879263878df27be94f814dfc.exe windows:4 windows x86 arch:x86
49de61b70e793169a5b53bc4c9b0a53e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindAtomW
GetDiskFreeSpaceW
ExitProcess
ResumeThread
SuspendThread
GetSystemTime
LoadLibraryA
VirtualAlloc
GetTickCount
lstrlenA
GetTickCount
GetFileAttributesA
CreateFileA
GetComputerNameW
GetCommandLineW
LocalFree
ResetEvent
GetModuleHandleW
GetPrivateProfileIntA
CloseHandle
user32
DispatchMessageA
GetCaretPos
CallWindowProcA
GetDlgItem
FillRect
DestroyCaret
CreateWindowExA
GetClientRect
EndDialog
CloseWindow
GetMenu
GetClassInfoA
DrawStateA
rasapi32
DwRasUninitialize
DwEnumEntryDetails
RasDeleteEntryA
RasDialA
DwCloneEntry
adsnt
DllGetClassObject
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 440KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 346KB - Virtual size: 345KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ