Static task
static1
Behavioral task
behavioral1
Sample
6b81ee2c69f0c163ad9cffaeda83cf36.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6b81ee2c69f0c163ad9cffaeda83cf36.exe
Resource
win10v2004-20231222-en
General
-
Target
6b81ee2c69f0c163ad9cffaeda83cf36
-
Size
135KB
-
MD5
6b81ee2c69f0c163ad9cffaeda83cf36
-
SHA1
90c09c279a0bc0298f2ad39ccc76f86c6de3df63
-
SHA256
16e0650b468ea2935886223bb8ece42dba7f8b603f49b9f74dcfa35e1727020b
-
SHA512
2c9a24be5bcffc8953fec587aa60a0e0f7763ce5b4d55fa8d710bb9d33c64202a9fa2f13c90b87105d0c087ae3a7b1eb2d82fc0de7bdbfe4f6606d402d0d64bb
-
SSDEEP
1536:R1MYOnZApGVsJ+3pxuCcjpgv4vKJ0pcnSANSSsWjcdSp2Re+BizJgVmzbxduJ:RrSULypxXcR00OSVdSme+BizJ5zbxdK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6b81ee2c69f0c163ad9cffaeda83cf36
Files
-
6b81ee2c69f0c163ad9cffaeda83cf36.exe windows:5 windows x86 arch:x86
cce52e446d06e1e9faf34bd0e686462a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateThread
CreateDirectoryA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetTempPathA
CreateFileW
GetStringTypeW
WriteConsoleW
FlushFileBuffers
GetModuleFileNameA
LCMapStringW
LoadLibraryW
OutputDebugStringW
SetFilePointerEx
SetStdHandle
HeapReAlloc
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
LoadLibraryExW
GetProcessId
GetModuleHandleW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
EncodePointer
DecodePointer
GetCommandLineA
IsDebuggerPresent
IsProcessorFeaturePresent
GetLastError
InterlockedDecrement
ExitProcess
GetModuleHandleExW
GetProcAddress
AreFileApisANSI
MultiByteToWideChar
HeapSize
Sleep
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
RtlUnwind
ReadFile
GetConsoleMode
ReadConsoleW
GetStdHandle
WriteFile
GetModuleFileNameW
HeapFree
SetFilePointer
HeapAlloc
RaiseException
WideCharToMultiByte
GetConsoleCP
SetLastError
InterlockedIncrement
GetCurrentThreadId
GetProcessHeap
GetFileType
DeleteCriticalSection
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetEndOfFile
user32
SendMessageA
PostQuitMessage
LoadCursorA
DispatchMessageA
PostMessageA
EndPaint
ShowWindow
CreateDialogParamA
RegisterClassExA
LoadStringA
LoadIconA
GetMessageA
BeginPaint
TranslateMessage
TranslateAcceleratorA
GetDlgItem
DefWindowProcA
LoadAcceleratorsA
shell32
ord680
ShellExecuteExA
comctl32
InitCommonControlsEx
wininet
InternetCloseHandle
InternetOpenA
InternetReadFile
InternetOpenUrlA
InternetQueryDataAvailable
rpcrt4
UuidToStringA
RpcStringFreeA
UuidCreate
shlwapi
PathRemoveFileSpecA
Sections
.text Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ