Static task
static1
Behavioral task
behavioral1
Sample
6116a739650c9794cfa4fc37dc5e86fc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6116a739650c9794cfa4fc37dc5e86fc.exe
Resource
win10v2004-20231215-en
General
-
Target
6116a739650c9794cfa4fc37dc5e86fc
-
Size
156KB
-
MD5
6116a739650c9794cfa4fc37dc5e86fc
-
SHA1
c24105831968e322aad436eb4c8eff9aca18325b
-
SHA256
b795b806561d9a86a110cb70fc9a996602e20f430d43d49c225f43d20934fbba
-
SHA512
ffb65c5d99803aa31a60f0b7ae8608c0a32324a34b7ce8af6d32d4efed0280a572cd61304cd59f8203ab01e8c9ad9e1f05d1980924728bc6eaea0a3c0dd3c20d
-
SSDEEP
3072:F37P9HNjVX4fhabvrHdevGVs7qET7bfep4Yti0r+BeDZEF4uq6k:FnVXjvrHovEs7tT7bxYvEW6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6116a739650c9794cfa4fc37dc5e86fc
Files
-
6116a739650c9794cfa4fc37dc5e86fc.exe windows:4 windows x86 arch:x86
acafd6bb9797cd2bbc16f8b167d21479
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileMappingA
CreateProcessA
DeleteFileA
DuplicateHandle
GetACP
GetConsoleMode
GetConsoleOutputCP
GetCurrentProcess
GetCurrentProcessId
GetFullPathNameA
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcessHeap
GetStringTypeA
GetSystemInfo
GetThreadLocale
GetVersionExA
GlobalReAlloc
HeapReAlloc
InterlockedCompareExchange
InterlockedExchange
IsBadReadPtr
IsDebuggerPresent
LCMapStringA
LoadLibraryA
LocalFree
Module32First
OpenProcess
RaiseException
SetCurrentDirectoryA
SetFilePointer
SetUnhandledExceptionFilter
TerminateProcess
TlsSetValue
WaitForSingleObject
WriteConsoleA
lstrcmpA
lstrlenA
user32
CreateWindowExA
DefWindowProcA
DestroyWindow
DialogBoxParamA
DispatchMessageA
DrawFocusRect
EnableMenuItem
EnumChildWindows
GetClassNameA
GetDlgItem
GetDlgItemTextA
GetFocus
GetForegroundWindow
GetSubMenu
GetWindow
GetWindowTextA
InflateRect
IntersectRect
IsDlgButtonChecked
LoadCursorA
MessageBeep
OffsetRect
PeekMessageA
PostMessageA
PtInRect
RegisterClassExA
RegisterClipboardFormatA
SendDlgItemMessageA
SetFocus
SetWindowPos
ShowWindow
SystemParametersInfoA
TranslateMessage
UnregisterClassA
UpdateWindow
advapi32
AdjustTokenPrivileges
AllocateAndInitializeSid
ChangeServiceConfig2A
CloseServiceHandle
ControlService
EqualSid
GetSecurityDescriptorControl
GetTokenInformation
GetUserNameA
InitializeSecurityDescriptor
LockServiceDatabase
LookupAccountSidA
LookupPrivilegeValueA
OpenProcessToken
OpenServiceA
QueryServiceConfig2A
QueryServiceStatus
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegFlushKey
RegOpenKeyA
RegQueryInfoKeyA
RegQueryValueA
RegQueryValueExA
RegSetValueExA
SetSecurityDescriptorDacl
SetServiceStatus
StartServiceA
StartServiceCtrlDispatcherA
Sections
.text Size: 142KB - Virtual size: 141KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 920B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ