Static task
static1
Behavioral task
behavioral1
Sample
6683a1b7fd8fc48d7a659c911d50ae46.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6683a1b7fd8fc48d7a659c911d50ae46.exe
Resource
win10v2004-20231215-en
General
-
Target
6683a1b7fd8fc48d7a659c911d50ae46
-
Size
752KB
-
MD5
6683a1b7fd8fc48d7a659c911d50ae46
-
SHA1
a1fd09493c623a3011f07fd617b4ea29e1729f6e
-
SHA256
4f58fe520a10512d734facd0ca6224613c17f66cbb90868baef6fc3b4baed443
-
SHA512
428f449e10cea29357697a5d9285ddeea2aea291c6d02dc46d655e7b38d2fbed389e8177d589fb5b0aeef35cce24371383b864b22b4adb46237362d32bc71cd9
-
SSDEEP
12288:zwf5y4bMDK3HdHALPPKFF+5/AWaoX5Dbca4TBztGkt0MAvvEUUggWP565TmugQMV:zwhMDK3HdHXu3caLqLAvvEUHmTmPKCcy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6683a1b7fd8fc48d7a659c911d50ae46
Files
-
6683a1b7fd8fc48d7a659c911d50ae46.exe windows:4 windows x86 arch:x86
396ded4fc866bccfc5496602ca4a2a34
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapDestroy
SuspendThread
CreateSemaphoreW
GetVersion
SetEvent
CloseHandle
OpenEventA
GetCommandLineW
ReleaseMutex
DeleteFileA
HeapCreate
GetEnvironmentVariableW
GetModuleHandleA
CloseHandle
FindResourceExA
lstrlenW
GetStartupInfoA
WriteConsoleA
ExitProcess
FindClose
user32
IsZoomed
GetSysColor
GetKeyState
GetWindowLongA
SetFocus
CreateIcon
DrawTextW
PeekMessageA
GetClassInfoA
DispatchMessageA
FindWindowA
DispatchMessageA
CallWindowProcW
docprop
DllGetClassObject
DllGetClassObject
DllGetClassObject
DllGetClassObject
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 744KB - Virtual size: 744KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ