Static task
static1
Behavioral task
behavioral1
Sample
060b34ecf7c75ebf5a11cbc8987094cd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
060b34ecf7c75ebf5a11cbc8987094cd.exe
Resource
win10v2004-20231215-en
General
-
Target
060b34ecf7c75ebf5a11cbc8987094cd
-
Size
73KB
-
MD5
060b34ecf7c75ebf5a11cbc8987094cd
-
SHA1
e941f0495c7590a9e99630cde14d4555d426ff11
-
SHA256
f43d267bda3942065eb0b9f612f2db4e328038d41e4f3bf427e053c0cb363c49
-
SHA512
f15b25c9c97c8d9381034bf7d71bade42801c44ae8a6a54fc12ba9de4f8c6cdcb09c0c4d673a3dbdbcf0b2ed37430f6869fdd6098715867ecc3f904f1d08f690
-
SSDEEP
768:3xkl/l2VByfR9RG/w5jjfbUL61iyWXvt5U2NGXmA1uKbcxElZwLYi7mVkaj1vcyV:IYcRp5QLkiyWLUzXmvzClGXBaj1h5R
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 060b34ecf7c75ebf5a11cbc8987094cd
Files
-
060b34ecf7c75ebf5a11cbc8987094cd.exe windows:4 windows x86 arch:x86
d944c735201e256d826d8b8cf2ffbad4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentConsoleFont
OpenFileMappingW
FormatMessageW
GlobalSize
CommConfigDialogA
ReadFile
DeviceIoControl
GetTempPathW
FindFirstFileExA
GetFileInformationByHandle
OpenSemaphoreW
GetTickCount
VDMOperationStarted
EnumDateFormatsW
lstrcpyn
RegisterWowBaseHandlers
VirtualAlloc
GetPriorityClass
QueryPerformanceCounter
MulDiv
WriteConsoleInputA
GetConsoleMode
lstrcmpiA
user32
DdeAddData
EmptyClipboard
PrivateExtractIconExW
UnionRect
MenuWindowProcW
SetSysColors
GetCaretPos
ShowWindow
DdeGetData
IsDialogMessageW
CreateIcon
IsZoomed
LoadImageA
OpenWindowStationA
DrawFrameControl
CopyRect
IsChild
GetKeyNameTextA
SetDebugErrorLevel
ValidateRgn
GetUpdateRect
TranslateMessage
GetPropA
LookupIconIdFromDirectoryEx
SetConsoleReserveKeys
SetClassWord
gdi32
GetEnhMetaFileDescriptionA
GetICMProfileW
GdiDescribePixelFormat
GetRegionData
RectInRegion
GetClipBox
RoundRect
GetBoundsRect
PatBlt
GetObjectType
GdiAddGlsRecord
ModifyWorldTransform
StartDocA
GetMetaRgn
GetBrushOrgEx
CreateEllipticRgnIndirect
ole32
HMETAFILE_UserMarshal
CreateErrorInfo
CoImpersonateClient
GetRunningObjectTable
CreateItemMoniker
CreateGenericComposite
StgGetIFillLockBytesOnFile
HPALETTE_UserUnmarshal
ReadOleStg
DllGetClassObject
CoReleaseMarshalData
EnableHookObject
WriteClassStm
HMETAFILEPICT_UserMarshal
CoTaskMemFree
HMETAFILEPICT_UserUnmarshal
HENHMETAFILE_UserFree
SNB_UserMarshal
CoMarshalHresult
OleConvertOLESTREAMToIStorageEx
UpdateDCOMSettings
UtGetDvtd32Info
SNB_UserFree
CoCreateInstance
StgGetIFillLockBytesOnILockBytes
CoInitialize
OleCreateMenuDescriptor
STGMEDIUM_UserUnmarshal
HMETAFILE_UserUnmarshal
UtConvertDvtd32toDvtd16
CoUninitialize
StgOpenAsyncDocfileOnIFillLockBytes
HBITMAP_UserUnmarshal
CreateStreamOnHGlobal
OleIsCurrentClipboard
HACCEL_UserMarshal
CreatePointerMoniker
HPALETTE_UserMarshal
Sections
.data Size: 4KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 2KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 41KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 25KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ