Static task
static1
Behavioral task
behavioral1
Sample
b6d3c9eda404f30cdbdd8838a9a18060.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b6d3c9eda404f30cdbdd8838a9a18060.exe
Resource
win10v2004-20240226-en
General
-
Target
b6d3c9eda404f30cdbdd8838a9a18060
-
Size
7KB
-
MD5
b6d3c9eda404f30cdbdd8838a9a18060
-
SHA1
47582da13c97902844df63305f198ad2be929d2c
-
SHA256
51885a3299e9fc3dbc6cb70dc3b5099a72523c34ffc4284b0d658714ef752f6c
-
SHA512
26518ae7c41e2709f1ad6131505b3f544fec283e376e1edf3f69754ef06d719a1fda67ee6c4053285f46afee4941c0e4d110b0ce7fcc86562ff806e105f1c078
-
SSDEEP
192:LUbT6ffMF8uC3HhxPDE524w9pTr0QIPE/6xevoJJvv4JU7W:gbTp6q5ITr68/CppvIU7W
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b6d3c9eda404f30cdbdd8838a9a18060
Files
-
b6d3c9eda404f30cdbdd8838a9a18060.exe windows:4 windows x86 arch:x86
cad61063c34013af6edc5fb3a2d7f1cc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpynA
GetCurrentThread
GetProcAddress
GetCurrentProcessId
CloseHandle
FindFirstFileA
GetTickCount
CreateProcessA
lstrcatA
GetStartupInfoA
FreeLibrary
LoadLibraryA
CreateDirectoryA
HeapAlloc
CreateFileA
lstrcmpiA
DeleteFileA
ReadFile
SetFilePointer
GetFileSize
GetTempFileNameA
GetSystemDirectoryA
GetModuleFileNameA
GetTempPathA
GetShortPathNameA
GetLastError
CreateMutexA
GetProcessHeap
HeapFree
Sleep
ExitProcess
user32
GetCapture
SetActiveWindow
wsprintfA
GetActiveWindow
gdi32
CreateCompatibleDC
CancelDC
GetBkMode
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 65B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE