Static task
static1
Behavioral task
behavioral1
Sample
6c97c0e3c5ecf8d710f0fcb4c629ab3a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6c97c0e3c5ecf8d710f0fcb4c629ab3a.exe
Resource
win10v2004-20231215-en
General
-
Target
6c97c0e3c5ecf8d710f0fcb4c629ab3a
-
Size
20KB
-
MD5
6c97c0e3c5ecf8d710f0fcb4c629ab3a
-
SHA1
182c18c354db7158d6ba8a09e5e544dfa84256d8
-
SHA256
8fddca1f5c638ce82b8b20dd77cef248474fd4c0c9d60f0d933d5868c154a5ec
-
SHA512
3a2fe552a65aa397c1dd048a298c198ca060b9162d056b327b0e7a6bf7d4105a76836d2adf70e51791ad9d82ce9ef139c8b3a3e922e749e169dc53eaa449db76
-
SSDEEP
192:akqPqDjBJciv0svTF7MqoSuOTnIdYT+Sh8Fvap7EF+1:a4HBJB8svTF4qoKnLBQvapf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6c97c0e3c5ecf8d710f0fcb4c629ab3a
Files
-
6c97c0e3c5ecf8d710f0fcb4c629ab3a.exe windows:4 windows x86 arch:x86
a863cfd49a47a7d0a96fc88c777a53a4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
GetCommandLineA
GetModuleHandleA
Sleep
LocalAlloc
lstrcatA
gdi32
BitBlt
GetBkColor
GetTextMetricsA
GetDeviceCaps
LineTo
MoveToEx
CreateSolidBrush
SetBkMode
user32
MessageBoxA
LoadIconA
CreateWindowExA
DialogBoxParamA
DispatchMessageA
GetFocus
EndPaint
GetSysColor
GetWindowRect
DefWindowProcA
ScreenToClient
SetFocus
DestroyWindow
TranslateMessage
GetClientRect
PostQuitMessage
ShowWindow
SetWindowTextA
GetMessageA
BeginPaint
msvcrt
__p__fmode
memmove
_exit
__p__commode
_adjust_fdiv
rand
__setusermatherr
wcslen
__CxxFrameHandler
_c_exit
exit
_initterm
wcstoul
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ