Static task
static1
Behavioral task
behavioral1
Sample
6a04b02354df3b71c964e252656f9877.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6a04b02354df3b71c964e252656f9877.exe
Resource
win10v2004-20231222-en
General
-
Target
6a04b02354df3b71c964e252656f9877
-
Size
180KB
-
MD5
6a04b02354df3b71c964e252656f9877
-
SHA1
3ab91093b46d5162e153a159cc64c8247396551e
-
SHA256
18f0c170c444b07634cbc8a386052651e957a6de10eadbcbfbddec2e64171990
-
SHA512
a653ca3e5ae590902bc1ed1a07c48be26667a74cfcd46b7ba43c7aeaafdc5e0593fed3b8277adc49972a1d9b0bdba8e1d5af1608542e9a19c65c80b6e5863bea
-
SSDEEP
3072:6WTvBGqC4sqnxMVy8O3F2FaqJv2oZZWrsF2REzsI2wLmBdAtop:vnxMVtSsLvvF2RPAG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6a04b02354df3b71c964e252656f9877
Files
-
6a04b02354df3b71c964e252656f9877.exe windows:4 windows x86 arch:x86
8d5a971bc8a94fbb01d79807412b426c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpiA
CreateProcessA
CreateFileA
CreateThread
DefineDosDeviceA
CreateEventA
WaitForSingleObject
GetTickCount
ExitThread
UnmapViewOfFile
CreateFileMappingA
FlushFileBuffers
SetStdHandle
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
HeapReAlloc
MapViewOfFile
HeapAlloc
GetOEMCP
GetACP
GetCPInfo
SetFilePointer
WriteFile
RtlUnwind
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
ExitProcess
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
FindFirstFileA
FindClose
GetVersionExA
CloseHandle
lstrcpynA
GetWindowsDirectoryA
SetCurrentDirectoryA
GetSystemDirectoryA
DeviceIoControl
WinExec
lstrlenA
lstrcpyA
lstrcatA
GetPrivateProfileStringA
GetPrivateProfileIntA
lstrcmpA
FreeLibrary
LoadLibraryA
GetLastError
GetProcAddress
VirtualAlloc
user32
GetClipCursor
GetWindowRect
IsWindow
BringWindowToTop
GetWindow
GetClientRect
LoadCursorFromFileA
CopyIcon
SetSystemCursor
ShowCursor
SendMessageA
CopyRect
GetWindowDC
SetWindowPos
ScreenToClient
PeekMessageA
keybd_event
SetCursorPos
GetForegroundWindow
mouse_event
GetWindowLongA
MapVirtualKeyA
GetSystemMetrics
LoadMenuA
GetSubMenu
GetMenuStringA
ModifyMenuA
SetCapture
TrackPopupMenu
DestroyMenu
ReleaseCapture
DestroyIcon
SetForegroundWindow
MessageBoxA
GetCursorPos
WindowFromPoint
GetDesktopWindow
GetClassNameA
SetTimer
DestroyWindow
PostQuitMessage
ClipCursor
KillTimer
DefWindowProcA
GetDC
ReleaseDC
DefDlgProcA
LoadIconA
LoadCursorA
RegisterClassExA
UnregisterClassA
GetSystemMenu
AppendMenuA
LoadStringA
wsprintfA
IsWindowEnabled
GetParent
IsWindowVisible
RegisterClassA
EnumChildWindows
CharUpperA
IsIconic
GetWindowTextA
SetWindowLongA
SetWindowRgn
SetClassLongA
MoveWindow
EndPaint
DrawIcon
GetClassLongA
BeginPaint
EnumWindows
UpdateWindow
DrawIconEx
LoadBitmapA
InvalidateRect
SetWindowTextA
ClientToScreen
GetScrollInfo
DeleteMenu
FindWindowA
PostMessageA
RegisterWindowMessageA
CreateDialogParamA
CreateWindowExA
ShowWindow
GetMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
gdi32
LineTo
CreateFontA
CreatePen
SelectObject
SetROP2
Arc
MoveToEx
TextOutA
DeleteObject
GetStockObject
CreateEllipticRgn
DeleteDC
BitBlt
CreateCompatibleDC
GetObjectA
SetBkMode
CreateSolidBrush
GetTextExtentPoint32A
GetPixel
advapi32
RegEnumValueA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
shell32
SHGetFileInfoA
ShellExecuteA
Shell_NotifyIconA
Sections
.text Size: 72KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE