Static task
static1
Behavioral task
behavioral1
Sample
6cc0898bacb4465737f3a7b2fe605077.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6cc0898bacb4465737f3a7b2fe605077.exe
Resource
win10v2004-20231215-en
General
-
Target
6cc0898bacb4465737f3a7b2fe605077
-
Size
355KB
-
MD5
6cc0898bacb4465737f3a7b2fe605077
-
SHA1
dcdc5e97284ab35e36b0cb376ea309938a175c08
-
SHA256
ab132ebb773d986bb9a20a9a96d14b10de4c31c1b9ce6a4c224865a7381f5040
-
SHA512
344acf42d261c9efd7f033179d2c86d5e36e4125cc06a3d8dc24a71789b5cb4960bdd1b5befb3d25644398c96aab5e23ad4ba7b919a25a58e447469379fbe0e9
-
SSDEEP
6144:a+3HxSlGPQBaZ+BqhMXAy6fYv2SeJ3eB8fvmKNNcQ5ta6gKv5R3L/XWlpWzsVV2+:z3R9QI0Ay6fYvzEOe2KNSQ6l83zBzsu+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6cc0898bacb4465737f3a7b2fe605077
Files
-
6cc0898bacb4465737f3a7b2fe605077.exe windows:4 windows x86 arch:x86
fcf0193dcb9ea90f3cde5eee4113ecb5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResetEvent
GetPrivateProfileIntA
CreateFileA
GetCommandLineW
lstrlenA
ExitProcess
CloseHandle
GetComputerNameW
GetModuleHandleW
LocalFree
GetFileAttributesA
VirtualAlloc
GetSystemTime
LoadLibraryA
GetTickCount
GetDiskFreeSpaceW
GetTickCount
SuspendThread
FindAtomW
ResumeThread
user32
CloseWindow
CreateWindowExA
DrawStateA
GetMenu
CallWindowProcA
DestroyCaret
FillRect
GetCaretPos
GetClassInfoA
GetDlgItem
EndDialog
DispatchMessageA
GetClientRect
rasapi32
RasDialA
DwEnumEntryDetails
RasDeleteEntryA
DwRasUninitialize
DwCloneEntry
adsnt
DllGetClassObject
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 440KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 346KB - Virtual size: 345KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ