Static task
static1
Behavioral task
behavioral1
Sample
6f47a76163847a762c6bd8f0eb9c39fd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6f47a76163847a762c6bd8f0eb9c39fd.exe
Resource
win10v2004-20231222-en
General
-
Target
6f47a76163847a762c6bd8f0eb9c39fd
-
Size
44KB
-
MD5
6f47a76163847a762c6bd8f0eb9c39fd
-
SHA1
1d85c287f1718ef3b2ac8341c2055a6994bac5d4
-
SHA256
b7963fcf02d04ea45f694b2a524f694a1b213a09636dcb7913ac1be50d4781b6
-
SHA512
d5a4edd4036289cb2c72e6d33a7fb63b6b4f0ba7aff1d235f15b01663c8db2763bec63b51788506736b13a6c5e4a248ff2ef28dfdec4b4b5791a092ae35cc521
-
SSDEEP
768:Bo1wBS/iAPx9my5ztoWp893vb53XvoDKTZ:Bo1wB2iAPxiWp89FPo6Z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6f47a76163847a762c6bd8f0eb9c39fd
Files
-
6f47a76163847a762c6bd8f0eb9c39fd.exe windows:4 windows x86 arch:x86
272e9c83d0e9ebd446f586da8452fc81
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WinExec
CopyFileA
GetModuleFileNameA
GetCurrentProcessId
GetProcAddress
LoadLibraryA
GetLocalTime
GetStringTypeW
CreateDirectoryA
LCMapStringW
LCMapStringA
MultiByteToWideChar
SetStdHandle
SetFilePointer
ReadFile
SetEndOfFile
GetOEMCP
GetACP
GetCPInfo
GetWindowsDirectoryA
DeleteFileA
Sleep
OpenProcess
GetStringTypeA
ReadProcessMemory
CreateFileA
CloseHandle
GetLastError
HeapReAlloc
VirtualAlloc
WriteFile
RtlUnwind
VirtualFree
HeapCreate
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapFree
HeapAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
FlushFileBuffers
user32
GetWindowThreadProcessId
FindWindowA
MessageBoxA
DefWindowProcA
DestroyWindow
DispatchMessageA
TranslateMessage
PeekMessageA
CreateWindowExA
LoadCursorA
RegisterClassA
advapi32
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegDeleteValueA
wsock32
send
recv
closesocket
htons
WSAStartup
gethostbyname
ioctlsocket
connect
socket
Sections
.text Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE