A:\jegK\cadyuFJrhobn4\tqUutvE\eGfiyGe.epb
Static task
static1
Behavioral task
behavioral1
Sample
c6cec8d4074a6dcae3746472af629a3a.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c6cec8d4074a6dcae3746472af629a3a.exe
Resource
win10v2004-20240226-en
General
-
Target
c6cec8d4074a6dcae3746472af629a3a
-
Size
86KB
-
MD5
c6cec8d4074a6dcae3746472af629a3a
-
SHA1
adbf8be5cd9070cfe9b2fa4a7a974a6971282b49
-
SHA256
34ef0d270ea5d7e885eaeca812c8bb385100c04a7bef6311e7006580554d781c
-
SHA512
ab8e0bd8a51f36770590daa901edfda94e68011eae7558b433cc5f3b58ef971e08451165a6cb21c5b62c25acdfdbfb25f95306e1bf9b16700c81a824b9b6d080
-
SSDEEP
1536:Wc0YYPzgT1SyKavvFI5vkYeFjtEAwCRy1r+LpXw1EEXPFIHsJYAgfw:WH/i17t+vqVtEys1ApXw1ZPKFfw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c6cec8d4074a6dcae3746472af629a3a
Files
-
c6cec8d4074a6dcae3746472af629a3a.exe windows:5 windows x86 arch:x86
dac167f812c467ff768b50eb222dec52
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
ChrCmpIW
ord158
PathCompactPathExW
StrStrW
StrCmpNA
PathMatchSpecA
PathFindNextComponentW
kernel32
lstrcmpiA
LoadLibraryExW
GetModuleHandleW
GetSystemTimeAdjustment
OpenSemaphoreA
GlobalFix
SetupComm
lstrcpynA
GetCommState
LoadLibraryW
GetTapePosition
SetMessageWaitingIndicator
IsBadWritePtr
lstrcatA
CreateJobSet
CancelWaitableTimer
SetMailslotInfo
GetModuleHandleExA
CreateHardLinkW
user32
CopyImage
GetWindowTextLengthW
InvalidateRgn
GetDialogBaseUnits
GetClipboardOwner
CreateCursor
GetClientRect
SetLastErrorEx
SetRect
GetAltTabInfoA
EnableMenuItem
MapWindowPoints
GetCursorPos
gdi32
DeleteEnhMetaFile
CreateFontIndirectW
GetRgnBox
GetTextCharsetInfo
CreateRectRgn
GetFontData
GetEnhMetaFileBits
PlayEnhMetaFileRecord
SetArcDirection
SetBkColor
SetViewportExtEx
Exports
Exports
?_ChildWindowFromPoint@@YGKPAD0@Z
?_ChildWindowFromPointEx@@YGKPAD0PAG@Z
?_WindowFromPhysicalPoint@@YGPAXPAKPAEPAI@Z
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.icode Size: 1024B - Virtual size: 643B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.m_data Size: 512B - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CData Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
NData Size: 1024B - Virtual size: 532B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 792B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ