Static task
static1
Behavioral task
behavioral1
Sample
b6d4c71151f3b6e3d0275a68fc785460.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b6d4c71151f3b6e3d0275a68fc785460.exe
Resource
win10v2004-20240226-en
General
-
Target
b6d4c71151f3b6e3d0275a68fc785460
-
Size
41KB
-
MD5
b6d4c71151f3b6e3d0275a68fc785460
-
SHA1
2f6182d593b614ed9eeed813994bf23d1dfb041e
-
SHA256
e8e9eb9d70bde742dbf2790aa30c58938f59b4e31f182a8eadc33f444ae3e92b
-
SHA512
a159d99be4e7b66b3b6ac0d02311a58b043ecdb9d4a611b3a9b07191b6440ed063e2bafdab138cd4f78e507c15a910e6a736094fe40cf5752da1295978524022
-
SSDEEP
768:OqJBx5jH5x9yhSsmGDQBE2fyAcZj65ZK0v8l0nbKVDuk1w4:N/5jPjsmGDQjU1OKvCGVDuf4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b6d4c71151f3b6e3d0275a68fc785460
Files
-
b6d4c71151f3b6e3d0275a68fc785460.exe windows:4 windows x86 arch:x86
fdeef0d2845848c21a4fd96841faf0de
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CreateStreamOnHGlobal
kernel32
ReadFile
OpenProcess
UnmapViewOfFile
MapViewOfFile
ReleaseMutex
WideCharToMultiByte
GetExitCodeProcess
WriteFile
lstrcatA
lstrcmpiA
lstrcpyA
LocalFree
Sleep
lstrlenW
lstrlenA
LocalAlloc
LoadLibraryA
GlobalMemoryStatus
GlobalFree
GetVolumeInformationA
GetVersionExA
GetTickCount
GetTempPathA
GetProcAddress
GetPrivateProfileStringA
GetPrivateProfileIntA
GetLogicalDrives
GetLocalTime
GetLastError
GetFileSize
GetDriveTypeA
GetDiskFreeSpaceA
GetComputerNameA
ExpandEnvironmentStringsA
CreateFileMappingA
CreateFileA
CloseHandle
CreateProcessA
lstrcpynA
user32
SetActiveWindow
mouse_event
SetCursorPos
GetCursorPos
wsprintfA
GetWindowRect
advapi32
GetUserNameA
RegQueryValueExA
RegOpenKeyA
RegEnumValueA
RegEnumKeyExA
RegCloseKey
shlwapi
StrStrIA
shell32
ShellExecuteA
wsock32
gethostname
gethostbyname
connect
closesocket
WSAStartup
socket
crypt32
CryptUnprotectData
Sections
.text Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 181KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.conf Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
SCryptor Size: 83B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ