Static task
static1
Behavioral task
behavioral1
Sample
b6b34909cbad260c6ea28cc6707a4f08.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b6b34909cbad260c6ea28cc6707a4f08.exe
Resource
win10v2004-20240226-en
General
-
Target
b6b34909cbad260c6ea28cc6707a4f08
-
Size
180KB
-
MD5
b6b34909cbad260c6ea28cc6707a4f08
-
SHA1
847ab94887e0b0f46ccd33f5c003c3a9e9d985a7
-
SHA256
e1e54f3150a222dc4216f4370719a5e428b5efec04ce4afef55aa62e970fc645
-
SHA512
3fb74e1444fcd654758731391d2e3bb4db7c4a5868ca8dc7447f503ed5cb59c7bba988b180b063a0d611ab82d06733b93e46b790a117981efd7c0e2f57356f80
-
SSDEEP
1536:NrQrf/icpj0oQ3XMiSkJJXr0iMRXjyLmy6edpG/i181NNiyttjOL:+mcrQ3XMzkJJXIiMjJJeHGqONtjW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b6b34909cbad260c6ea28cc6707a4f08
Files
-
b6b34909cbad260c6ea28cc6707a4f08.exe windows:4 windows x86 arch:x86
197d38a7b5a5cdbbd65148275c444854
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemDirectoryA
WinExec
GetVersionExA
CreateFileA
GetModuleFileNameA
SetFileTime
GetFileAttributesExA
GetLastError
DuplicateHandle
GetCurrentProcess
OpenProcess
WriteFile
GetStartupInfoA
GetModuleHandleA
CloseHandle
CreateProcessA
WaitForSingleObject
TerminateProcess
LoadLibraryA
GetProcAddress
Sleep
FreeLibrary
WideCharToMultiByte
user32
GetMessageA
ShowWindow
CreateWindowExA
TranslateMessage
SendMessageTimeoutA
RegisterWindowMessageA
GetClassNameA
PostMessageA
EnumChildWindows
GetWindowThreadProcessId
EnumWindows
DefWindowProcA
GetDesktopWindow
DispatchMessageA
RegisterClassExA
PostQuitMessage
advapi32
LookupAccountNameA
DeleteService
OpenServiceA
OpenSCManagerA
CreateServiceA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
StartServiceA
ConvertSidToStringSidA
GetUserNameA
CloseServiceHandle
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
CoUninitialize
oleaut32
SysFreeString
VariantClear
msvcrt
??2@YAPAXI@Z
_strlwr
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
fopen
fwrite
fflush
fclose
_stricmp
rand
wcslen
atoi
strchr
strstr
__CxxFrameHandler
sprintf
_access
srand
time
??3@YAXPAX@Z
shlwapi
SHGetValueA
SHSetValueA
dbghelp
ImageNtHeader
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 120KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
odata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ndata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
edata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
idata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ