Static task
static1
Behavioral task
behavioral1
Sample
6612a9120d2b7612ae5e4a5e64f59398.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6612a9120d2b7612ae5e4a5e64f59398.exe
Resource
win10v2004-20231215-en
General
-
Target
6612a9120d2b7612ae5e4a5e64f59398
-
Size
94KB
-
MD5
6612a9120d2b7612ae5e4a5e64f59398
-
SHA1
316f26a8c2249f4dd77ccb9b1977b6369ec3245c
-
SHA256
671b27eab940039abdfc5480ac3321b9522383c4f753c6af712e503ff7ee4054
-
SHA512
41d7be4ea306fed432837ad5d4c7fc9b7ff529693879eaabff5bbabaacc9306ba72ae91e15b1ea55a1432a640c89b634d46b328ba99a7b2da3c0f873048de44f
-
SSDEEP
1536:QGKC3xSMwx0M5tAXB/bLDiAR4BRhanToIfXIO5tsqhCVO4Z:iCgMaAXBT8n2TBf556qgVO4Z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6612a9120d2b7612ae5e4a5e64f59398
Files
-
6612a9120d2b7612ae5e4a5e64f59398.exe windows:5 windows x64 arch:x64
543087a4436ab98a03770af5e2a83c9d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
CreateEventW
DeleteCriticalSection
GetCurrentThreadId
TerminateProcess
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
InitializeCriticalSection
CreateMutexW
Sleep
CloseHandle
CreateFileW
GetModuleHandleA
LoadLibraryA
GetProcAddress
GetModuleFileNameW
ReadProcessMemory
GetModuleHandleW
CreateProcessW
GetCurrentProcessId
GetSystemInfo
GetCurrentProcess
GetStartupInfoW
msvcp90
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QEAA@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QEAA@AEBV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QEAA@PEBD@Z
?allocate@?$allocator@D@std@@QEAAPEAD_K@Z
?deallocate@?$allocator@D@std@@QEAAXPEAD_K@Z
?allocate@?$allocator@_W@std@@QEAAPEA_W_K@Z
?deallocate@?$allocator@_W@std@@QEAAXPEA_W_K@Z
wsock32
WSAStartup
gethostname
msvcr90
__CxxFrameHandler3
memset
memcpy
?_type_info_dtor_internal_method@type_info@@QEAAXXZ
__crt_debugger_hook
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
?terminate@@YAXXZ
__set_app_type
_encode_pointer
_fmode
_commode
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_cexit
_wfopen_s
memmove_s
?what@exception@std@@UEBAPEBDXZ
??1exception@std@@UEAA@XZ
??0exception@std@@QEAA@XZ
??0exception@std@@QEAA@AEBQEBD@Z
??0exception@std@@QEAA@AEBV01@@Z
_invalid_parameter_noinfo
fread
??3@YAXPEAX@Z
ftell
fseek
fclose
??2@YAPEAX_K@Z
malloc
free
vsprintf_s
_CxxThrowException
_amsg_exit
__wgetmainargs
__C_specific_handler
_XcptFilter
_exit
Sections
.text Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 688B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ