Static task
static1
Behavioral task
behavioral1
Sample
6fc645ce8387098d1dce7cb8af8009af.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6fc645ce8387098d1dce7cb8af8009af.exe
Resource
win10v2004-20231215-en
General
-
Target
6fc645ce8387098d1dce7cb8af8009af
-
Size
372KB
-
MD5
6fc645ce8387098d1dce7cb8af8009af
-
SHA1
8278fab11e00119c35c6068d22069ec5dc64bdf6
-
SHA256
e3f5411fe0341cbc41fa2ae20595ae8509bbda02cfb5d759fca69faf175fe0b1
-
SHA512
ab862175187f64567bdcbaa58733ba21dd6cde87546e67bc927a4116c708d919d332d1ae6c5ac1f6f52f3322b55f2909eb1ddf322dd0ea707c198095145e782a
-
SSDEEP
6144:V+wcttwieKo+NRgGhFRmyZtzZ8n41RwR7CUVyWxuJJUfaI4nI:0wmxbfzRDPuneRwR7CUgJJUfaIa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6fc645ce8387098d1dce7cb8af8009af
Files
-
6fc645ce8387098d1dce7cb8af8009af.exe windows:4 windows x86 arch:x86
12e2c7bf2e66be46dde21c8fc34d208c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForDebugEvent
FlushFileBuffers
SystemTimeToTzSpecificLocalTime
GetModuleFileNameW
SetTapeParameters
ReleaseSemaphore
lstrcpyA
SetConsoleOutputCP
lstrcpynA
GetFileAttributesA
GetStartupInfoW
FindFirstVolumeMountPointA
OpenProcess
RegisterWaitForInputIdle
PeekConsoleInputA
FlushInstructionCache
GetCommandLineW
GetPrivateProfileStructA
UnlockFileEx
Sleep
WritePrivateProfileStructA
WriteFileEx
UpdateResourceA
OpenMutexA
GetEnvironmentVariableA
GetProfileStringA
GetCurrentProcess
GetDllDirectoryA
ClearCommError
AddAtomA
GetDriveTypeA
OpenEventA
VirtualAlloc
GetLocaleInfoA
GetProcessWorkingSetSize
_hread
GetThreadPriorityBoost
advapi32
RegDeleteKeyA
GetEffectiveRightsFromAclA
user32
ScrollWindow
LockWindowUpdate
RealGetWindowClassA
SetWindowPlacement
GrayStringA
DrawMenuBar
IsMenu
GetClassInfoA
MapVirtualKeyExA
SetDlgItemInt
ShowWindowAsync
DragDetect
IsDialogMessageA
TranslateAcceleratorA
MenuWindowProcA
EnumDisplaySettingsExA
GetTaskmanWindow
CharUpperBuffW
AllowForegroundActivation
GetKeyboardLayoutNameA
DestroyCaret
ScreenToClient
GetScrollBarInfo
MonitorFromRect
EnumDisplayDevicesA
SetKeyboardState
GetWindowInfo
GetWindowTextA
GetDC
GetQueueStatus
SetProgmanWindow
SetMenuDefaultItem
LoadKeyboardLayoutA
CalcMenuBar
SetDebugErrorLevel
GetMessagePos
LoadIconA
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 358KB - Virtual size: 681KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ