Static task
static1
Behavioral task
behavioral1
Sample
6a74aa78d1802cd22d0ebfa338279470.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6a74aa78d1802cd22d0ebfa338279470.exe
Resource
win10v2004-20231215-en
General
-
Target
6a74aa78d1802cd22d0ebfa338279470
-
Size
440KB
-
MD5
6a74aa78d1802cd22d0ebfa338279470
-
SHA1
bc04ea136856e31f2333022ed2092916969ba214
-
SHA256
dbae69266b5cd2ac0424d64ff65d2a4e48e4d16f534dad5cc27e3a67ee60a392
-
SHA512
6c1855b066c23c6ee137216810db39b3da752c96009b8c6d7d4cdc73a715ab2d07509121e3c6037f457bdf348644951e08940a1a5567ad16f87f6c8baeb6bc51
-
SSDEEP
12288:KgTrA1Vs5JjEOgI2UMkLwS7fqTm7Tp/MlmrRpHQJ9:zTrAU5JoOgIx7pkYdi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6a74aa78d1802cd22d0ebfa338279470
Files
-
6a74aa78d1802cd22d0ebfa338279470.exe windows:4 windows x86 arch:x86
947779eadd6f4ae8930c69fe4f4a0c30
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalSize
CopyFileExW
GetCommandLineA
VirtualAlloc
GetVolumePathNameA
GetProcessHeap
GetThreadSelectorEntry
CreateTimerQueue
GetLogicalDriveStringsA
GetComputerNameA
TransmitCommChar
GetCalendarInfoA
GetThreadContext
GetWindowsDirectoryA
GetTickCount
SetProcessPriorityBoost
ConvertDefaultLocale
WritePrivateProfileSectionA
OpenWaitableTimerA
RaiseException
GetCPInfoExA
SetConsoleIcon
SetFilePointer
FindFirstFileExA
GetPrivateProfileStructA
CompareStringA
OutputDebugStringA
GetPrivateProfileStringA
GetCurrentProcess
gdi32
SetViewportOrgEx
shell32
SHGetSpecialFolderPathA
winmm
timeGetTime
timeBeginPeriod
Sections
.itext Size: - Virtual size: 692B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 428KB - Virtual size: 425KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 968B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ