Static task
static1
Behavioral task
behavioral1
Sample
6350da45bab45d36707d841cfaf4d11a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6350da45bab45d36707d841cfaf4d11a.exe
Resource
win10v2004-20231215-en
General
-
Target
6350da45bab45d36707d841cfaf4d11a
-
Size
604KB
-
MD5
6350da45bab45d36707d841cfaf4d11a
-
SHA1
038e68d7e46376db547d7e3bab07cdfb28ab3568
-
SHA256
282d02023759acb8991c3991b534967734a54d24aebf263184e1cc52fb1c3449
-
SHA512
ec39008a4e44fd44cd7fef18ad05227ab97c8bc76e551a18e75192b4f1792286f54a46e7f98693913d9b2825d14353ee7be40c054cde4e77669471d7d4c779a2
-
SSDEEP
12288:BdtuoOMW2FYUGnAUpQr2R3L/cij5MZaMAst9TYF4Bov23RKBVSvN48P+mOAQi/bp:14kUKJqPvg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6350da45bab45d36707d841cfaf4d11a
Files
-
6350da45bab45d36707d841cfaf4d11a.exe windows:4 windows x86 arch:x86
4be7c0c4228c6a294bdbe93b5e915ce1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MultiByteToWideChar
GetVolumeInformationA
FindClose
FindFirstFileA
FindNextFileA
SetFileTime
SystemTimeToFileTime
GetSystemTime
CopyFileA
Sleep
DeleteFileA
GetModuleFileNameA
GetModuleHandleA
GetSystemDirectoryA
lstrcatA
GetTickCount
ExitProcess
WaitForSingleObject
FreeLibrary
GetProcAddress
CreateFileA
GetPrivateProfileStringA
GetTempFileNameA
GetWindowsDirectoryA
GetLastError
CreateMutexA
InitializeCriticalSection
DeleteCriticalSection
RaiseException
SetEndOfFile
GetLocaleInfoW
GetOEMCP
SetStdHandle
ReadFile
lstrlenA
GetFileSize
CloseHandle
WriteFile
GetLocaleInfoA
GetACP
InterlockedExchange
LoadLibraryA
GetVersionExA
IsBadCodePtr
IsBadReadPtr
GetSystemInfo
VirtualProtect
GetStringTypeW
GetStringTypeA
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
RtlUnwind
HeapFree
GetStartupInfoA
GetCommandLineA
HeapReAlloc
HeapAlloc
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetCPInfo
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
SetFilePointer
FlushFileBuffers
SetUnhandledExceptionFilter
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
HeapSize
VirtualQuery
GetStdHandle
UnhandledExceptionFilter
user32
UpdateWindow
CreateWindowExA
RegisterClassExA
LoadCursorA
LoadIconA
DispatchMessageA
TranslateMessage
PeekMessageA
ShowWindow
advapi32
RegOpenKeyA
RegSetValueExA
RegCloseKey
OpenSCManagerA
OpenServiceA
CloseServiceHandle
QueryServiceStatus
StartServiceA
RegCreateKeyExA
shell32
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
ole32
CoInitialize
CoUninitialize
CoCreateInstance
wininet
InternetConnectA
InternetCloseHandle
InternetReadFile
HttpQueryInfoA
HttpSendRequestA
InternetOpenA
InternetCrackUrlA
HttpOpenRequestA
Sections
.text Size: 548KB - Virtual size: 544KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE