Static task
static1
Behavioral task
behavioral1
Sample
6415cdb1428512acc8ad5aa4618b0fae.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6415cdb1428512acc8ad5aa4618b0fae.exe
Resource
win10v2004-20231215-en
General
-
Target
6415cdb1428512acc8ad5aa4618b0fae
-
Size
305KB
-
MD5
6415cdb1428512acc8ad5aa4618b0fae
-
SHA1
ebf3d105c2ad1657d58bae5bf91861113353df09
-
SHA256
5c1760c63eb3625c2ee95f048fb3ff5189104ee90c9155b65544a6876ed48d7b
-
SHA512
5062d0c297a0a8077f7d879eec244246b67f5a62adee5aa6dfe5019f9b2baf242f835985b5a210bc697578e09f0ad3a040ec7a31779630464d79f33efc2be339
-
SSDEEP
6144:bqCSaCaTDTXmNOzCpjjhjNAW/g1sIYstrH1dAVZru/rqz7u3:eZ4TDDmNOzKnDAWo1s5MV6VIzqW3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6415cdb1428512acc8ad5aa4618b0fae
Files
-
6415cdb1428512acc8ad5aa4618b0fae.exe windows:1 windows x86 arch:x86
27aab3adb01021a83f0792e5d9136ed6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CopyFileA
CreateFileA
CreateProcessA
CreateRemoteThread
CreateThread
DeleteFileA
DuplicateHandle
ExitProcess
ExitThread
FindClose
FindFirstFileA
FindNextFileA
FindResourceA
FormatMessageA
GetCommandLineA
GetCurrentProcess
GetCurrentProcessId
GetDriveTypeA
GetLastError
GetLogicalDriveStringsA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemDirectoryA
GetSystemTime
GetTempPathA
GetWindowsDirectoryA
LoadLibraryA
LoadResource
LocalAlloc
LocalFree
LockResource
OpenProcess
ReadFile
ReadProcessMemory
ResumeThread
SetFileAttributesA
SizeofResource
Sleep
SuspendThread
VirtualAllocEx
VirtualProtect
WriteFile
WriteProcessMemory
user32
CharUpperA
DialogBoxParamW
MessageBoxA
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegOpenKeyExA
RegSetValueExA
psapi
EnumProcesses
Sections
.data Size: 280KB - Virtual size: 279KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.code Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ