Static task
static1
Behavioral task
behavioral1
Sample
6fa81b01956b0241474f1a3236de3a15.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6fa81b01956b0241474f1a3236de3a15.exe
Resource
win10v2004-20231215-en
General
-
Target
6fa81b01956b0241474f1a3236de3a15
-
Size
121KB
-
MD5
6fa81b01956b0241474f1a3236de3a15
-
SHA1
9674e1d72169d72df9e49d9672a2e79b7677da79
-
SHA256
eb01c8df0cdc4505522aaa219f9f956524be47d1246c677ebe30131541c03055
-
SHA512
f175fb73ec64233239762a4ca6390df55c6d0d6c95bc8225cd9410727507b950cd7cf64d40beff7b154411abcb940bc40657b25fe1236118fe2574b53ceafc28
-
SSDEEP
1536:xh3w+Hd6J2UMqIOyzgi/lz8cTVo4ygbWhRJlPzPXbmjiLNkaf8MbtmM4+IsJ0s/J:/9eIV9FRLWhDRDX9NkaUoIC0s/oqh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6fa81b01956b0241474f1a3236de3a15
Files
-
6fa81b01956b0241474f1a3236de3a15.exe windows:4 windows x86 arch:x86
546517814596f8a36bb37d4dceb7d440
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
socket
send
select
__WSAFDIsSet
kernel32
GetCurrentProcessId
SetEndOfFile
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
Sleep
GetLastError
CreateThread
GetModuleFileNameA
ExitThread
LeaveCriticalSection
EnterCriticalSection
GetTickCount
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetLocalTime
MultiByteToWideChar
ReadFile
CloseHandle
WriteFile
TransactNamedPipe
CreateFileA
QueryPerformanceCounter
QueryPerformanceFrequency
ExitProcess
CreateProcessA
GetSystemDirectoryA
LoadLibraryA
GetProcAddress
GetModuleHandleA
FormatMessageA
GlobalUnlock
GlobalLock
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
SetFileTime
GetFileTime
ExpandEnvironmentStringsA
SetFileAttributesA
GetFileAttributesA
GetTempPathA
WideCharToMultiByte
GetComputerNameA
GetCurrentProcess
TerminateProcess
OpenProcess
DeleteFileA
CopyFileA
WaitForSingleObject
CreateMutexA
MoveFileA
GetExitCodeProcess
PeekNamedPipe
DuplicateHandle
CreatePipe
GetLocaleInfoA
GetVersionExA
GetLogicalDrives
GlobalMemoryStatus
GetTimeFormatA
GetDateFormatA
TerminateThread
HeapAlloc
HeapFree
RtlUnwind
HeapReAlloc
GetStartupInfoA
GetCommandLineA
GetVersion
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
RaiseException
HeapSize
LCMapStringA
LCMapStringW
GetCPInfo
GetACP
GetOEMCP
SetFilePointer
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
Sections
.text Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 43KB - Virtual size: 216KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE