Static task
static1
Behavioral task
behavioral1
Sample
6aa3a62b16012c7b3d5251bbbb8f53e7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6aa3a62b16012c7b3d5251bbbb8f53e7.exe
Resource
win10v2004-20231215-en
General
-
Target
6aa3a62b16012c7b3d5251bbbb8f53e7
-
Size
180KB
-
MD5
6aa3a62b16012c7b3d5251bbbb8f53e7
-
SHA1
d39c0be69669e9baf43b04fe7cd30c37ecad3048
-
SHA256
e4e74bf8509b7d46cf25fbdd0ec0a8205d6cbaabb9f737faa0661a71439c56e9
-
SHA512
ad70f0cb442f9502e83abfa8083a230c85153bbe83236c72a7d92ffb7a6c40b8cf47c2ce48762a460f444e87b029543437ddeb16337d5a0633931312215d10c0
-
SSDEEP
1536:s18tfFLMA/yVsKh70WuJVwSnmFY14gKq9+FjcwhmQ0AdqtFUMgkSSMWJYpyJP1Ss:DXMn2k+iPG+FIwAQ0UqcBkSKJgoAbPYB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6aa3a62b16012c7b3d5251bbbb8f53e7
Files
-
6aa3a62b16012c7b3d5251bbbb8f53e7.exe windows:4 windows x86 arch:x86
a048bfe78a9e9503dd03694c26dce59c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WinExec
GetModuleFileNameA
CreateFileA
SetFileTime
GetFileAttributesExA
DuplicateHandle
GetCurrentProcess
OpenProcess
LoadLibraryA
WideCharToMultiByte
FreeLibrary
TerminateProcess
WaitForSingleObject
CreateProcessA
GetVersionExA
GetStartupInfoA
GetModuleHandleA
GetProcAddress
Sleep
CloseHandle
GetSystemDirectoryA
GetLastError
WriteFile
user32
SendMessageTimeoutA
RegisterWindowMessageA
GetClassNameA
RegisterClassExA
EnumChildWindows
GetWindowThreadProcessId
EnumWindows
ShowWindow
CreateWindowExA
DispatchMessageA
GetDesktopWindow
TranslateMessage
PostQuitMessage
DefWindowProcA
PostMessageA
GetMessageA
advapi32
OpenSCManagerA
CreateServiceA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
DeleteService
OpenServiceA
ConvertSidToStringSidA
LookupAccountNameA
GetUserNameA
StartServiceA
CloseServiceHandle
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
CoUninitialize
oleaut32
SysFreeString
VariantClear
msvcrt
fflush
_stricmp
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??2@YAPAXI@Z
??3@YAXPAX@Z
fopen
fwrite
_strlwr
sprintf
_access
srand
time
rand
wcslen
atoi
strchr
strstr
__CxxFrameHandler
fclose
shlwapi
SHSetValueA
SHGetValueA
dbghelp
ImageNtHeader
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 120KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
odata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ndata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
edata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
idata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ