Static task
static1
Behavioral task
behavioral1
Sample
a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe
Resource
win10v2004-20240226-en
General
-
Target
a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.sample
-
Size
151KB
-
MD5
a7f0dd0cb9991516f790ec44755409b5
-
SHA1
18d6987544371b43ce3248d159cef229d63025bf
-
SHA256
a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274
-
SHA512
42033b2a96e6c1a048c85b199b57a0dd75dacc4e0ef1efd031d384fd6d64a7e1ec5e8d18a595de571229b75da7d7bc92b64cc00d8554cac6bfe4d09544fbb741
-
SSDEEP
3072:N+PpToisYIJJPuQJvYEnpZXNF+1/TniPnJptO/YfSzlMPCS1:NqoVYSPfRZX/sTiPnPtO2gGCS1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.sample
Files
-
a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.sample.exe windows:6 windows x86 arch:x86
22d4bcbe49dab98627104a915c9a92d7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
GetConsoleWindow
SetConsoleCursorPosition
AllocConsole
GetLogicalDrives
FindFirstFileW
GetFileSizeEx
FindFirstVolumeW
FindNextFileW
GetFinalPathNameByHandleW
WaitForMultipleObjects
SetThreadPriority
GetQueuedCompletionStatus
lstrlenA
FindClose
PostQueuedCompletionStatus
SetFileAttributesW
GetCurrentThread
GetSystemInfo
LoadLibraryW
CreateThread
ExitProcess
SetFilePointerEx
LocalFree
MoveFileExW
FindVolumeClose
GetCurrentProcessId
SetThreadExecutionState
GetVolumePathNamesForVolumeNameW
FindNextVolumeW
CreateIoCompletionPort
GetDriveTypeW
HeapCreate
HeapFree
HeapSize
HeapAlloc
GetProcessHeap
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
HeapReAlloc
LCMapStringW
CompareStringW
GetProcAddress
WriteConsoleW
ScrollConsoleScreenBufferW
GetNativeSystemInfo
GetLastError
Sleep
OpenProcess
ReleaseMutex
WaitForSingleObject
CreateMutexW
SetProcessShutdownParameters
GetStdHandle
TerminateProcess
GetCommandLineW
GetCurrentProcess
SetPriorityClass
GetConsoleScreenBufferInfo
ReadFile
DeleteCriticalSection
GetLocalTime
CloseHandle
lstrcatW
CreateFileW
SetFilePointer
InitializeCriticalSection
LeaveCriticalSection
GetModuleFileNameW
WriteFile
EnterCriticalSection
lstrcmpiW
lstrcpyW
lstrlenW
SetVolumeMountPointW
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetFileType
GetCommandLineA
GetModuleHandleExW
RaiseException
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
RtlUnwind
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
DecodePointer
user32
ShowWindow
wsprintfA
wsprintfW
advapi32
AllocateAndInitializeSid
SetEntriesInAclW
SetNamedSecurityInfoW
FreeSid
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
shell32
SHGetFolderPathW
SHEmptyRecycleBinW
ShellExecuteW
CommandLineToArgvW
ole32
CoCreateInstance
CoSetProxyBlanket
CoInitialize
CoUninitialize
oleaut32
VariantClear
SysAllocString
VariantInit
rstrtmgr
RmGetList
RmRegisterResources
RmStartSession
RmEndSession
shlwapi
PathRemoveFileSpecW
StrStrIW
PathFindExtensionW
Sections
.text Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ