Static task
static1
Behavioral task
behavioral1
Sample
c6d6b75b0621333506c209eec6c8cbd5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c6d6b75b0621333506c209eec6c8cbd5.exe
Resource
win10v2004-20240226-en
General
-
Target
c6d6b75b0621333506c209eec6c8cbd5
-
Size
32KB
-
MD5
c6d6b75b0621333506c209eec6c8cbd5
-
SHA1
aaef9f7dbfcbe0693ec24eb0bae2f126e4739adb
-
SHA256
cd4cc2a02f5bbf0776a4820f8785dd4650a1d2e6ef82ee75943a40e0abdea2a0
-
SHA512
e44e0242974fc4cb499ab285c71e481669d80fbb246798c2ba7d97bbe0c2b388e3f0a26075f19c816ba4998eb3ed86bac707ff3ee4c67c56289077bb76cfe994
-
SSDEEP
768:oNJzYg2peLwNWkXv6C0c1lHK5exh9PoJrj/:UYlMsNfyz8lHXtAJrj/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c6d6b75b0621333506c209eec6c8cbd5
Files
-
c6d6b75b0621333506c209eec6c8cbd5.exe windows:4 windows x86 arch:x86
d9e3d8f6cab428135f8f636e70b12d29
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcatA
lstrcpyA
GetEnvironmentVariableA
GetShortPathNameA
ExitThread
ExitProcess
GetCurrentProcessId
GetTickCount
GetCurrentProcess
GetProcessHeap
CloseHandle
TerminateThread
GetTempPathA
CreateThread
GetModuleHandleA
GetStartupInfoA
SetPriorityClass
GetCurrentThread
SetThreadPriority
CreateProcessA
ResumeThread
GetModuleFileNameA
CopyFileA
SetFileAttributesA
GetLastError
lstrlenA
LoadLibraryA
GetProcAddress
Sleep
GetVersionExA
GlobalMemoryStatus
HeapAlloc
GetSystemDirectoryA
user32
wsprintfA
ExitWindowsEx
comdlg32
GetFileTitleA
advapi32
OpenProcessToken
RegisterServiceCtrlHandlerA
SetServiceStatus
OpenSCManagerA
CreateServiceA
OpenServiceA
StartServiceA
RegOpenKeyA
RegSetValueExA
CloseServiceHandle
RegCloseKey
RegOpenKeyExA
StartServiceCtrlDispatcherA
AdjustTokenPrivileges
LookupPrivilegeValueA
DeleteService
mfc42
ord537
ord6648
ord4129
ord6877
ord939
ord2818
ord800
ord4278
ord860
ord6663
ord858
ord535
ord540
ord2915
ord2764
ord2846
ord5710
ord922
ord924
ord926
msvcrt
rand
srand
atoi
__CxxFrameHandler
strstr
strncmp
_except_handler3
printf
fprintf
_iob
_local_unwind2
_mbscmp
strtok
strchr
__dllonexit
_onexit
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
exit
time
urlmon
URLDownloadToFileA
msvcp60
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
ws2_32
recv
inet_ntoa
gethostbyname
closesocket
connect
htons
inet_addr
socket
send
WSAGetLastError
ntohl
__WSAFDIsSet
setsockopt
WSAStartup
sendto
WSASocketA
gethostname
WSACleanup
htonl
Sections
.text Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 243KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ