Static task
static1
Behavioral task
behavioral1
Sample
c6f9f55a01615e8ad6116bfd35bd7198.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c6f9f55a01615e8ad6116bfd35bd7198.exe
Resource
win10v2004-20240226-en
General
-
Target
c6f9f55a01615e8ad6116bfd35bd7198
-
Size
208KB
-
MD5
c6f9f55a01615e8ad6116bfd35bd7198
-
SHA1
723afc5fce0968b3ddb62317ed38e34f7afef215
-
SHA256
818dc45f0355cf356e36c651ac3b4963105a5272da20005bb095181f7dec1478
-
SHA512
94fe1ffe22b7c0c231e1aef4289d78639c1021c0f0e34e22c5b15d6cb17f028f146d67c935e96f27871ebae16b0c0b4f73a3ea7c36e60674144c5bc4889d97f0
-
SSDEEP
3072:hLLFp/ljbCjrL0oNa/rInoUtq1cGZuqMbiTxKI0oWSLvBSq2R7XIbHmSDZX:tnlqj30oAzUtq1cGso0ILYqw7X7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c6f9f55a01615e8ad6116bfd35bd7198
Files
-
c6f9f55a01615e8ad6116bfd35bd7198.exe windows:4 windows x86 arch:x86
6ae75b121d33383f73885b13d1fec55d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
SHDeleteValueA
PathGetCharTypeA
PathIsContentTypeA
SHQueryInfoKeyA
SHEnumValueA
SHDeleteKeyA
msvcrt
memset
srand
pow
strcmp
comdlg32
ChooseColorA
GetSaveFileNameA
FindTextA
GetOpenFileNameA
GetFileTitleA
user32
RegisterWindowMessageA
RedrawWindow
MessageBoxA
PeekMessageW
PostMessageA
LoadIconA
OffsetRect
PostQuitMessage
PeekMessageA
ReleaseCapture
RemovePropA
LoadStringA
RemoveMenu
SetActiveWindow
SendMessageA
LoadBitmapA
RegisterClassA
PtInRect
MapVirtualKeyA
ReleaseDC
LoadCursorA
MessageBeep
RegisterClipboardFormatA
LoadKeyboardLayoutA
MapWindowPoints
OemToCharA
OpenClipboard
ScrollWindow
SendMessageW
ScreenToClient
gdi32
CreateFontIndirectA
CreatePenIndirect
CreateDIBitmap
SetPixel
SetTextColor
CreatePalette
CreateCompatibleBitmap
GetBitmapBits
oleaut32
RegisterTypeLib
GetErrorInfo
version
GetFileVersionInfoSizeA
kernel32
VirtualQuery
lstrcmpiA
lstrcpynA
ExitThread
GetVersionExA
lstrcmpA
VirtualAllocEx
IsBadReadPtr
WriteFile
WideCharToMultiByte
MulDiv
LocalFree
lstrcpyA
VirtualFree
lstrlenA
MoveFileA
SizeofResource
LocalReAlloc
lstrlenW
lstrcatA
GetModuleHandleW
LoadLibraryA
VirtualAlloc
WaitForSingleObject
GetModuleHandleA
ExitProcess
LocalAlloc
MoveFileExA
GetProcAddress
HeapDestroy
comctl32
ImageList_Write
ImageList_DragShowNolock
ImageList_Add
ImageList_Draw
ole32
CLSIDFromString
WriteClassStm
PropVariantClear
shell32
SHGetSpecialFolderLocation
SHFileOperationA
SHGetDiskFreeSpaceA
Sections
.text Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 649B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc9 Size: 512B - Virtual size: 414B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc5 Size: 123KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc2 Size: 1024B - Virtual size: 675B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc8 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc6 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 976B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ