Static task
static1
Behavioral task
behavioral1
Sample
6dcfd0a4c5e1f4bd137187d39590f8c5f2f29cecdb2dcdce605b803145643cd3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6dcfd0a4c5e1f4bd137187d39590f8c5f2f29cecdb2dcdce605b803145643cd3.exe
Resource
win10v2004-20231215-en
General
-
Target
6dcfd0a4c5e1f4bd137187d39590f8c5f2f29cecdb2dcdce605b803145643cd3
-
Size
3.0MB
-
MD5
c442dd3808dfbd6fa768319f3d0b8deb
-
SHA1
c8fed7b8adc07ffee4aa90b049be0e99cada3b5f
-
SHA256
6dcfd0a4c5e1f4bd137187d39590f8c5f2f29cecdb2dcdce605b803145643cd3
-
SHA512
7711c0d441b69e9e2dd90579cc53a7ca3b7f21f6b3fcfc00a4fac1bc6f9696e0ac1628799a4ff89f79e9eeb0473e7f727bd35d7a7865b2bbf5b316bd0b81c481
-
SSDEEP
384:8oaL6S896g0SoVBAtRPWPyWCn5/hW5Zlp9kH0goFSBRXXsC0XxIOEtTaiBmcR:8tLcF0VVBSMdZpaIFSnXXsC0Xm4gme
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6dcfd0a4c5e1f4bd137187d39590f8c5f2f29cecdb2dcdce605b803145643cd3
Files
-
6dcfd0a4c5e1f4bd137187d39590f8c5f2f29cecdb2dcdce605b803145643cd3.exe .js windows:4 windows x86 arch:x86 polyglot
36e589f5c57213c03d30fe6e70827128
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegCloseKey
RegCreateKeyA
RegSetValueExA
kernel32
DeleteCriticalSection
EnterCriticalSection
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemTimeAsFileTime
GetTickCount
GlobalAlloc
GlobalFree
InitializeCriticalSection
LeaveCriticalSection
MultiByteToWideChar
QueryPerformanceCounter
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
WideCharToMultiByte
WinExec
msvcrt
__dllonexit
__getmainargs
__initenv
__lconv_init
__set_app_type
__setusermatherr
_acmdln
_amsg_exit
_cexit
_fmode
_initterm
_iob
_lock
_onexit
_unlock
abort
calloc
exit
fclose
fopen
fprintf
free
fwrite
getenv
malloc
memcmp
memcpy
signal
sprintf
sscanf
strcat
strcmp
strcpy
strlen
strncmp
strrchr
vfprintf
wcscmp
ole32
CoGetClassObject
OleInitialize
OleSetContainedObject
OleUninitialize
oleaut32
SafeArrayAccessData
SafeArrayCreate
SafeArrayDestroy
SysAllocString
SysFreeString
VariantClear
VariantInit
user32
AdjustWindowRect
CreateWindowExA
DefWindowProcA
DispatchMessageA
GetClientRect
GetDesktopWindow
GetWindowLongA
PeekMessageA
PostQuitMessage
RegisterClassExA
SetFocus
SetWindowLongA
SetWindowTextA
ShowWindow
TranslateMessage
UpdateWindow
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE