Static task
static1
Behavioral task
behavioral1
Sample
06249af8a481d47527d1bc4431e2bf55.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
06249af8a481d47527d1bc4431e2bf55.exe
Resource
win10v2004-20231215-en
General
-
Target
06249af8a481d47527d1bc4431e2bf55
-
Size
72KB
-
MD5
06249af8a481d47527d1bc4431e2bf55
-
SHA1
31f9121817a0e262c146d32076cdc4d7aa6a0f4d
-
SHA256
7277bee5e113a2d7da9dca9f8675a032b30c2a7a4b4559e32ab7f1724467fb6b
-
SHA512
4bc2592a87ffeec2fa7e51c89168873ba2083cc57d6d29fd9413153be558b8620dd3d72d01cd51d4b8dbbd43ccb174894c1e288cfd8cc2bc8aabe40950fc5e8b
-
SSDEEP
768:CiaTuAovwPGeDVcYLgO2/MuTPUaZ1oJbu7ZL8VcOv:Cia0YPGsy1O0MuTPU+1IaL8VcOv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 06249af8a481d47527d1bc4431e2bf55
Files
-
06249af8a481d47527d1bc4431e2bf55.exe windows:4 windows x86 arch:x86
1a06ac31cff5ee816927ac0b59fd87a3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
SetFilePointer
GetModuleHandleA
GetCurrentProcess
WriteFile
CreateFileA
GetLastError
LoadLibraryA
SetFileAttributesA
GetProcAddress
GetStartupInfoA
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
RegEnumValueA
RegCreateKeyExA
RegCloseKey
OpenProcessToken
user32
GetClassNameA
GetForegroundWindow
winmm
mixerGetLineInfoA
mixerSetControlDetails
mixerOpen
msvcrt
_onexit
__setusermatherr
_initterm
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
??3@YAXPAX@Z
sprintf
__CxxFrameHandler
__dllonexit
__getmainargs
_exit
_XcptFilter
exit
_acmdln
_adjust_fdiv
Sections
.text Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ