Static task
static1
Behavioral task
behavioral1
Sample
c6570658ada87c42214d48158f37ea4d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c6570658ada87c42214d48158f37ea4d.exe
Resource
win10v2004-20240226-en
General
-
Target
c6570658ada87c42214d48158f37ea4d
-
Size
644KB
-
MD5
c6570658ada87c42214d48158f37ea4d
-
SHA1
f2220634f8a453df6c931d4d59f601e4d65bc556
-
SHA256
7003bcca5334adb40e3ebe0fb918abbe739fa625f90fe146bf3e3eac9da37de5
-
SHA512
d2519d8948222ea1d66a7cb6b8c07b9ae8b691f176de715522e2b56614b1daa36cd4088917398a2f420cb74f215f75a6af1012f482135621bedb73f05376bab9
-
SSDEEP
12288:kvL09Smo/ocmvLV3A5X20XcFinm5xlt1XKhNYSXXH:kvwhVLEKxkWS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c6570658ada87c42214d48158f37ea4d
Files
-
c6570658ada87c42214d48158f37ea4d.exe windows:5 windows x86 arch:x86
5d6d4064729e4a41941cb09285e29c1f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProfileIntA
DeleteFileW
lstrcpy
SetThreadUILanguage
TerminateThread
VirtualAlloc
ReadFile
AreFileApisANSI
ExitProcess
GetBinaryType
GetOverlappedResult
lstrcmp
IsBadCodePtr
RemoveDirectoryA
version
GetFileVersionInfoW
VerLanguageNameA
VerInstallFileW
VerFindFileW
VerInstallFileA
VerFindFileA
VerQueryValueW
GetFileVersionInfoA
GetFileVersionInfoSizeW
GetFileVersionInfoSizeA
VerQueryValueA
VerLanguageNameW
opengl32
glPixelMapfv
glTexCoord3iv
glTexCoord1i
glRotated
glFrustum
glColor4f
glTexCoord3s
glGetTexParameterfv
glDeleteLists
glRectsv
glPrioritizeTextures
glTexParameterfv
glRasterPos2d
glColor3b
glGetMapdv
sqlunirl
_GetShortPathName_@12
_GetServiceDisplayName_@16
_ChangeMenu_@20
_OpenFile_@12
_SHGetPathFromIDList_@8
_IsCharAlphaNumeric_@4
_GetModuleHandle_@4
_ObjectPrivilegeAuditAlarm_@24
_InsertMenuItem_@16
_GetClassInfo@12
_CharLowerBuff_@8
_CreateProcessAsUser_@44
_GetPrivateProfileString_@24
_ShellExecute_@24
_MapVirtualKey_@8
catsrvut
?GetITypeLib@CComPlusTypelib@@QAEPAUITypeLib@@XZ
WinlogonHandlePendingInfOperations
??_7CComPlusMethod@@6B@
RegDBRestore
??4CComPlusTypelib@@QAEAAV0@ABV0@@Z
??1CComPlusInterface@@UAE@XZ
??0CComPlusInterface@@QAE@ABV0@@Z
QueryUserDllW
??1CComPlusComponent@@UAE@XZ
??_7CComPlusInterface@@6B@
DllGetClassObject
CGMIsAdministrator
DllCanUnloadNow
??4CComPlusInterface@@QAEAAV0@ABV0@@Z
??4CComPlusComponent@@QAEAAV0@ABV0@@Z
DllRegisterServer
??0CComPlusComponent@@QAE@ABV0@@Z
user32
GetWindowDC
GetMenu
GetParent
Sections
.text Size: 347KB - Virtual size: 346KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 126KB - Virtual size: 126KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idat_73 Size: 166KB - Virtual size: 240KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ