Static task
static1
Behavioral task
behavioral1
Sample
6d5443569a93c67928615010595f4272.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6d5443569a93c67928615010595f4272.exe
Resource
win10v2004-20231215-en
General
-
Target
6d5443569a93c67928615010595f4272
-
Size
200KB
-
MD5
6d5443569a93c67928615010595f4272
-
SHA1
c882215e045587a968e0889926508a95985de6c1
-
SHA256
bb7bec66a0a91fe1948b5bbcb743368255fe9687c548a6fc3921c9e35c6c31a1
-
SHA512
d9161131080829b4d9a06cacd22bbea1b76cabcfb336c5c9956c63794ae7690ab7e72ae2ca5bf2a21bfec4fdcc812c72dbf83fd731d38dd720662d2a75c9d28f
-
SSDEEP
3072:lKlBWDx1toFTeDr/GlN2meu9SyDakG7PzjKJoY46Hi2tCUbMv:lKlA1AFTWroNq/fkZohxVmE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6d5443569a93c67928615010595f4272
Files
-
6d5443569a93c67928615010595f4272.exe windows:5 windows x64 arch:x64
00dce297a9678a6f6ed1b33e5efd46e7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetCommandLineW
DecodePointer
RaiseException
GetLastError
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
FindResourceExW
GetModuleHandleW
GetProcAddress
LoadResource
LockResource
SizeofResource
FindResourceW
GetShortPathNameW
GetModuleFileNameW
CloseHandle
VirtualQuery
LocalFree
SetLastError
FindNextFileW
GetCurrentProcess
GetEnvironmentVariableW
FindClose
LoadLibraryW
FreeLibrary
lstrcmpiW
GetTickCount
lstrlenW
MultiByteToWideChar
WideCharToMultiByte
WriteFile
GetPrivateProfileIntW
OutputDebugStringA
CreateFileW
GetCurrentThreadId
GetPrivateProfileStringW
Sleep
OutputDebugStringW
GetCurrentProcessId
TerminateProcess
WaitForSingleObjectEx
GetFileAttributesExW
GetSystemTimeAsFileTime
FlushFileBuffers
TryEnterCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
CreateEventW
SetEvent
ResetEvent
ExitProcess
IsDebuggerPresent
GetModuleHandleExW
GetStdHandle
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
LoadLibraryExW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
QueryPerformanceCounter
InitializeSListHead
GetStartupInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EncodePointer
LCMapStringW
GetStringTypeW
GetCPInfo
RtlUnwindEx
RtlPcToFileHeader
GetSystemInfo
VirtualProtect
GetFileType
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
SetFilePointerEx
GetConsoleCP
GetConsoleMode
WriteConsoleW
LoadLibraryExA
Sections
.text Size: 85KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE