Static task
static1
Behavioral task
behavioral1
Sample
6622a8198fae0c72b187861529fdeaed.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6622a8198fae0c72b187861529fdeaed.exe
Resource
win10v2004-20231215-en
General
-
Target
6622a8198fae0c72b187861529fdeaed
-
Size
173KB
-
MD5
6622a8198fae0c72b187861529fdeaed
-
SHA1
eda8321e0592a02e2f7a9df7e940e91dc26918f7
-
SHA256
e55c49f57b6225dcca7e3f5323537c92ffba8fe4000b9ff18a1e9f163e59afae
-
SHA512
411e14c7092eae3c3c6a4dde46982bbe41af60cbf1399543b34ee748d063d90d609079e8f84db0638d2e41d0ff3ed701ff4b0f0da04ee93972ce97c7d98e3fd2
-
SSDEEP
3072:RLzlW0dlXqwCn2dmXqzVt+Y5cRk073tAostUJ+Vw5b2wHz:RNW0dhngXmVtB5cRl73Vmg+My
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6622a8198fae0c72b187861529fdeaed
Files
-
6622a8198fae0c72b187861529fdeaed.exe windows:4 windows x86 arch:x86
0078910ffb1a5af130aa95ee95c48c47
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegOpenKeyExW
RegCloseKey
RegSetValueW
RegQueryValueExW
RegSetValueExW
RegCreateKeyW
RegDeleteKeyW
RegEnumKeyExW
user32
RegisterClassExW
RegisterDeviceNotificationW
KillTimer
CreateWindowExW
SetTimer
UnregisterDeviceNotification
LoadCursorW
SendMessageW
IsWindow
DestroyWindow
DefWindowProcW
wsprintfW
shlwapi
PathAddBackslashW
PathFindExtensionW
PathRemoveExtensionW
PathGetDriveNumberW
PathFileExistsW
PathFindFileNameW
ole32
CoGetProcessIdentifier
StringFromGUID2
CoTaskMemFree
CoInitialize
GetRunningObjectTable
CoFreeUnusedLibraries
CoTaskMemAlloc
CoCreateInstance
CoUninitialize
CreateItemMoniker
kernel32
GlobalFree
GetCalendarInfoW
InterlockedCompareExchange
GetSystemDirectoryA
WideCharToMultiByte
WaitForSingleObject
GetCurrentProcess
SetCurrentDirectoryA
GetEnvironmentVariableW
GetProfileStringW
GetModuleFileNameA
TlsFree
TerminateProcess
CreateSemaphoreA
QueryPerformanceCounter
DeleteFileW
ReleaseMutex
GetFileSize
UnhandledExceptionFilter
CreateMutexA
GetCurrentDirectoryA
EnumResourceNamesA
GetCurrentProcessId
GetSystemTimeAsFileTime
lstrcmpW
TlsSetValue
GetCurrentThreadId
MultiByteToWideChar
ReadFile
InitializeCriticalSection
GlobalAlloc
lstrlenW
GlobalLock
GetTempPathW
GlobalSize
IsDebuggerPresent
ReleaseSemaphore
SetUnhandledExceptionFilter
GetProcAddress
GetWindowsDirectoryA
TlsGetValue
GetLocalTime
GlobalUnlock
RaiseException
wmvcore
WMCreateProfileManager
ddraw
DirectDrawCreateEx
Sections
.text Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 1024B - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ