Static task
static1
Behavioral task
behavioral1
Sample
6815710ba93870212c414e5b4fc1c2b2eef16fb2a4f38e23bf0b4b5f6ac633d4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6815710ba93870212c414e5b4fc1c2b2eef16fb2a4f38e23bf0b4b5f6ac633d4.exe
Resource
win10v2004-20231215-en
General
-
Target
6815710ba93870212c414e5b4fc1c2b2eef16fb2a4f38e23bf0b4b5f6ac633d4
-
Size
3.0MB
-
MD5
b9ab4548f3362e35d87ba792a0dbc5a9
-
SHA1
0684fcab08e4f48f718a1c507d0b7b7c52f8ea2c
-
SHA256
6815710ba93870212c414e5b4fc1c2b2eef16fb2a4f38e23bf0b4b5f6ac633d4
-
SHA512
7750a195c76af86a549b68979762f26de2f8d58b08fbd0a19b7f76b781557ec7ade350bc48718aa440fb24cb588ad1914f84fcb8803c20804f4126eb7764a8f9
-
SSDEEP
49152:EIkGI+sjeGljS1cs5QZuTtS0rQMYOQ+q8CEZjSn6rivjStS9KFeMP:EH1jeBLWsM0r1QnMOqS0FeC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6815710ba93870212c414e5b4fc1c2b2eef16fb2a4f38e23bf0b4b5f6ac633d4
Files
-
6815710ba93870212c414e5b4fc1c2b2eef16fb2a4f38e23bf0b4b5f6ac633d4.exe windows:4 windows x86 arch:x86
58dbeae88109fc17527fc4023fdb428b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocalTime
CreateMutexA
LocalFree
CreateFileA
OpenProcess
Sleep
OpenMutexA
CreateFileMappingA
SetUnhandledExceptionFilter
CloseHandle
GetWindowsDirectoryA
SetEvent
EnterCriticalSection
GetCurrentProcess
GetPrivateProfileStringA
QueryDosDeviceA
Process32NextW
GetLogicalDriveStringsA
Process32FirstW
CreateToolhelp32Snapshot
DuplicateHandle
SetFileAttributesA
OpenFileMappingA
GetFileSize
GetProcessTimes
DeleteFileA
MultiByteToWideChar
WideCharToMultiByte
GetCurrentDirectoryW
SetFilePointer
SystemTimeToFileTime
LocalFileTimeToFileTime
GetTickCount
CreateEventA
WaitForSingleObject
GetCurrentProcessId
InitializeCriticalSection
GetFileAttributesA
LeaveCriticalSection
OutputDebugStringA
UnmapViewOfFile
MapViewOfFile
GetLastError
OpenEventA
GetModuleFileNameA
WriteFile
WaitNamedPipeA
CreateDirectoryA
SetEndOfFile
GetLocaleInfoW
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
LoadLibraryA
GetStringTypeW
ReadFile
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
DeleteCriticalSection
ExitThread
GetCurrentThreadId
CreateThread
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
GetCommandLineA
GetVersionExA
GetProcessHeap
RaiseException
RtlUnwind
LCMapStringA
LCMapStringW
GetCPInfo
GetProcAddress
GetModuleHandleA
ExitProcess
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapSize
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetConsoleCP
GetConsoleMode
GetACP
GetOEMCP
IsValidCodePage
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
FlushFileBuffers
user32
wsprintfA
advapi32
LookupPrivilegeValueW
OpenProcessToken
AdjustTokenPrivileges
RegDeleteValueA
SetNamedSecurityInfoA
GetNamedSecurityInfoA
RegOpenKeyExA
RegCloseKey
RegEnumKeyExA
SetEntriesInAclA
BuildExplicitAccessWithNameA
shell32
SHGetSpecialFolderPathA
ShellExecuteA
SHChangeNotify
ole32
CoCreateGuid
CoInitialize
psapi
GetProcessImageFileNameA
iphlpapi
GetAdaptersInfo
wininet
InternetReadFile
InternetQueryOptionA
InternetCloseHandle
InternetConnectA
InternetSetOptionA
HttpSendRequestA
HttpOpenRequestA
InternetOpenA
HttpQueryInfoA
Sections
.text Size: 380KB - Virtual size: 379KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 92KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 690B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ