Static task
static1
Behavioral task
behavioral1
Sample
f6a884618a39ba1d96a9b2090c611cca79d2574c3b363e03ee9693b7eb5f6e44.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f6a884618a39ba1d96a9b2090c611cca79d2574c3b363e03ee9693b7eb5f6e44.exe
Resource
win10v2004-20240226-en
General
-
Target
f6a884618a39ba1d96a9b2090c611cca79d2574c3b363e03ee9693b7eb5f6e44
-
Size
303KB
-
MD5
0ce82ffc88e60e4a2392b0479a1793a1
-
SHA1
b7f1031005a9350046e808e1eb10b1ca16bd8b7e
-
SHA256
f6a884618a39ba1d96a9b2090c611cca79d2574c3b363e03ee9693b7eb5f6e44
-
SHA512
ba2812a230278cd4e9fa495f4d2029c0fcc4061c16c2430f96f61aaa2b2b9c2e0f458ad0a45aa080729e40380e0da1f27b5cb1a9f3fd41ec2c073d2214921647
-
SSDEEP
6144:ddI/RDUXW62fs1FbIbrvBcVPH0T5J5ZtmOZpd:XI/RDUm/S5IH57/oS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f6a884618a39ba1d96a9b2090c611cca79d2574c3b363e03ee9693b7eb5f6e44
Files
-
f6a884618a39ba1d96a9b2090c611cca79d2574c3b363e03ee9693b7eb5f6e44.exe windows:4 windows x86 arch:x86
d81c567f619d668a6d27f07b97b2051e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateEventW
GetVersionExW
GetModuleHandleW
FindResourceW
SizeofResource
LoadResource
LockResource
FreeResource
GetLastError
GetCurrentThreadId
FindResourceExW
WideCharToMultiByte
CreateFileW
SetFilePointer
ReadFile
SystemTimeToFileTime
GetCurrentDirectoryW
MultiByteToWideChar
LocalFileTimeToFileTime
WriteFile
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
OpenProcess
VirtualAllocEx
WriteProcessMemory
GetModuleHandleA
CreateRemoteThread
WaitForSingleObject
GetSystemDirectoryW
CreateFileA
SetEndOfFile
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
FlushFileBuffers
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
LoadLibraryA
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetCommandLineW
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetOEMCP
GetCPInfo
GetStartupInfoA
GetFileType
DeleteFileW
GetModuleFileNameW
GetTempPathW
CloseHandle
GetCurrentProcess
GetCurrentProcessId
LoadLibraryW
GetFileAttributesW
Sleep
GetTickCount
CreateThread
GetProcAddress
SetHandleCount
InterlockedDecrement
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetConsoleMode
GetConsoleCP
GetModuleFileNameA
GetStdHandle
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetVersionExA
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetStartupInfoW
RtlUnwind
ExitProcess
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualFree
VirtualAlloc
HeapCreate
user32
LoadAcceleratorsW
GetMessageW
TranslateAcceleratorW
TranslateMessage
LoadStringW
LoadIconW
LoadCursorW
RegisterClassExW
CreateWindowExW
DispatchMessageW
SetCursorPos
SendInput
GetWindowTextW
WindowFromPoint
GetWindowRect
FindWindowW
UnregisterClassA
GetSystemMetrics
GetWindowDC
PrintWindow
EndDialog
PostQuitMessage
EndPaint
BeginPaint
DefWindowProcW
DestroyWindow
DialogBoxParamW
gdi32
DeleteObject
GetDIBits
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
CreateDCW
BitBlt
DeleteDC
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
shell32
ShellExecuteW
ws2_32
WSAStartup
socket
gethostbyname
inet_addr
gethostbyaddr
htons
connect
closesocket
send
recv
Sections
.text Size: 140KB - Virtual size: 140KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 275KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 124KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ