Static task
static1
Behavioral task
behavioral1
Sample
6ce1499b490225c5de482cdac6bb9286.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6ce1499b490225c5de482cdac6bb9286.exe
Resource
win10v2004-20231215-en
General
-
Target
6ce1499b490225c5de482cdac6bb9286
-
Size
22KB
-
MD5
6ce1499b490225c5de482cdac6bb9286
-
SHA1
6cc1ebdfdeda6d382a735ec5674abb28de089f3a
-
SHA256
d47917e6a25764e8d594428dc7bc009a1be6d1f0faa9d7660122a3de09300219
-
SHA512
564440bdae7868e76bbc049187b14133ef40ba5529965ab00e076d771eb8b047546517d0a187c4fd67d75fecebba7ef2b87da2e4bd2c008f34cbdcd9d737264f
-
SSDEEP
384:ecnE0N9TugdeVfaO+BWVHcufg/1uR07MGLfBGmFRRZYcfH6kLmz:ecnHN9T9eBgWVHcufs8+7zVGa1Y8vLmz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6ce1499b490225c5de482cdac6bb9286
Files
-
6ce1499b490225c5de482cdac6bb9286.exe windows:4 windows x86 arch:x86
f13fa1a1394daf4bb47d46dbdf83dce8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
rasapi32
RasEnumConnectionsA
kernel32
GetFileSize
GetLastError
GetModuleFileNameA
GetStartupInfoA
ExitProcess
GetCommandLineA
CloseHandle
SetEndOfFile
WriteFile
SetFilePointer
GetTempPathA
GetProcessHeap
WideCharToMultiByte
GetThreadLocale
SetUnhandledExceptionFilter
GetTimeZoneInformation
GetLocalTime
GetWindowsDirectoryA
GetCurrentProcess
TerminateProcess
lstrlenA
LoadLibraryA
GetProcAddress
GetModuleHandleA
UnhandledExceptionFilter
CreateProcessA
GetSystemDefaultLCID
RtlUnwind
user32
CharNextA
advapi32
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
ole32
StringFromCLSID
CoCreateGuid
Sections
.text Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ