Static task
static1
Behavioral task
behavioral1
Sample
6c4b25b42b85e7421b69fdd22f63f733.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6c4b25b42b85e7421b69fdd22f63f733.exe
Resource
win10v2004-20231215-en
General
-
Target
6c4b25b42b85e7421b69fdd22f63f733
-
Size
231KB
-
MD5
6c4b25b42b85e7421b69fdd22f63f733
-
SHA1
2cfa86f1a16e4ecd3e29d4d39d50bcce144b1639
-
SHA256
d00075bf1efdec8b600b970b2569037ed37b13bedc03d11ea87ee7a967a5d2e1
-
SHA512
96d1e56f6f6378450dcd49ffe6dfa0f219c3b28a9a5ec1b63776bdb6384d793119afe2dab00b53dcae59460ccd9da8611a1119f629a0a274c9aeb8654b0fc2a7
-
SSDEEP
3072:/HDIPcneq4tbGa05xIa5r1tXsHR4EW+xfagfV5XzV0QvWCzBCAyG6NdNBjDbF0JK:scneqCqjiRxNTzVRR6Nd7r43bzMr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6c4b25b42b85e7421b69fdd22f63f733
Files
-
6c4b25b42b85e7421b69fdd22f63f733.exe windows:4 windows x86 arch:x86
ea82462496252b3342b2a055f71bb9c2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
GetCommandLineA
GetVersionExA
VirtualAllocEx
LoadLibraryA
ExitProcess
GetCommandLineW
GetProcAddress
GetACP
LocalAlloc
GetModuleHandleA
LoadLibraryExA
IsBadReadPtr
gdi32
SelectPalette
SetBkMode
GetBitmapBits
GetPaletteEntries
BitBlt
GetDIBColorTable
SelectObject
CreateCompatibleDC
CopyEnhMetaFileA
GetClipBox
ole32
CoUnmarshalInterface
CoFreeUnusedLibraries
CreateBindCtx
StgOpenStorage
CoCreateInstanceEx
CoDisconnectObject
user32
DestroyMenu
DispatchMessageA
MsgWaitForMultipleObjects
GetIconInfo
DefMDIChildProcA
GetMenu
EnumThreadWindows
GetMenuItemID
WindowFromPoint
SetClipboardData
TrackPopupMenu
CharNextW
RemoveMenu
IsWindowEnabled
OpenClipboard
OffsetRect
CreateWindowExA
GetSystemMenu
ShowScrollBar
DrawIconEx
RegisterClipboardFormatA
SetWindowsHookExA
SetWindowPos
DestroyWindow
EnableMenuItem
ClientToScreen
RedrawWindow
PostQuitMessage
GetWindowRect
InsertMenuItemA
EnumChildWindows
IsWindowUnicode
SetScrollPos
GetLastActivePopup
SetRect
SetMenu
PostMessageA
GetWindow
GetTopWindow
wsprintfA
GetKeyboardLayout
SetForegroundWindow
GetWindowLongA
GetMenuItemInfoA
LoadCursorA
SetCapture
GetWindowDC
GetDCEx
TranslateMDISysAccel
GetCapture
CharToOemA
CreateMenu
ShowWindow
EnumWindows
UpdateWindow
DefWindowProcA
GetSystemMetrics
GetMenuStringA
LoadIconA
GetActiveWindow
ShowOwnedPopups
MessageBeep
SetMenuItemInfoA
GetCursorPos
CharLowerBuffA
ScreenToClient
MapVirtualKeyA
CheckMenuItem
InflateRect
IsDialogMessageW
InsertMenuA
KillTimer
SendMessageW
DestroyCursor
IsDialogMessageA
GetKeyboardLayoutNameA
GetScrollRange
SetActiveWindow
SetScrollRange
CreatePopupMenu
GetCursor
Sections
CODE Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 153KB - Virtual size: 153KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
RES5 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
RES9 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
RES4 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
RES8 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
RES3 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
RES0 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
RES7 Size: 1024B - Virtual size: 733B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ