Static task
static1
Behavioral task
behavioral1
Sample
6eeb20cc709a18bf8845f7b678967b7f0ff96475cf51a261da87244886bbfd2e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6eeb20cc709a18bf8845f7b678967b7f0ff96475cf51a261da87244886bbfd2e.exe
Resource
win10v2004-20240226-en
General
-
Target
6eeb20cc709a18bf8845f7b678967b7f0ff96475cf51a261da87244886bbfd2e
-
Size
83KB
-
MD5
7ade88674690aa74970c12608b23bb30
-
SHA1
6522ee8ccc93ce3abec0a77a1732c15bb16a7ba0
-
SHA256
6eeb20cc709a18bf8845f7b678967b7f0ff96475cf51a261da87244886bbfd2e
-
SHA512
8849c9bfb8a7221c60ce1615e65e6af6c77739f1c5696a0d37ddcad374b8564e756373a20a27b5cb4f2c079b87111e26805bf857f22f57ce787f848a35522aca
-
SSDEEP
1536:8gN43SA7bhL8SZDluVvZcwxwpY+IS9mzHYFNfryrbt0H9/CXOkTsW/z3cdf+B/qO:LN43PNpnuVvZc/IS9mzHYFNfAt8/C+rw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6eeb20cc709a18bf8845f7b678967b7f0ff96475cf51a261da87244886bbfd2e
Files
-
6eeb20cc709a18bf8845f7b678967b7f0ff96475cf51a261da87244886bbfd2e.exe windows:6 windows x86 arch:x86
c20bdcb2d02d3e0bacdf97b73a347fe4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
GetProcessId
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
lstrcmpiW
CreateMutexW
WaitForSingleObject
GetLogicalDriveStringsW
GetModuleFileNameW
FindFirstFileW
MoveFileW
FindNextFileW
WaitForMultipleObjects
LeaveCriticalSection
InitializeCriticalSection
FindClose
ExitThread
Sleep
GetNativeSystemInfo
CreateThread
DeleteCriticalSection
lstrcmpW
WriteConsoleW
GetFileSize
SetFilePointerEx
CloseHandle
CreateFileW
WriteFile
lstrlenW
EnterCriticalSection
ReadFile
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
HeapReAlloc
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwind
GetLastError
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
RaiseException
HeapSize
GetStdHandle
ExitProcess
GetModuleHandleExW
HeapAlloc
GetProcessHeap
HeapFree
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetFileType
GetStringTypeW
DecodePointer
advapi32
CryptImportKey
RegSetValueExW
RegOpenKeyExW
CryptReleaseContext
CryptEncrypt
CryptGenRandom
CryptAcquireContextW
shell32
ShellExecuteW
rstrtmgr
RmRegisterResources
RmEndSession
RmShutdown
RmStartSession
RmGetList
shlwapi
StrStrIW
Sections
.text Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 261KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ