Resubmissions
11-04-2024 07:29
240411-jbfccsef62 1011-04-2024 07:28
240411-jaw9gshg4y 911-04-2024 07:28
240411-jawmysef47 1011-04-2024 07:28
240411-jawb7aef46 811-04-2024 07:28
240411-jav2esef45 707-04-2024 09:04
240407-k11v2ahh64 707-04-2024 09:04
240407-k1s57ahe5z 1007-04-2024 09:03
240407-k1d19she41 1007-04-2024 09:03
240407-kz78qahe4v 818-12-2023 04:55
231218-fj6bzaadg5 10Static task
static1
Behavioral task
behavioral1
Sample
6ffdead52c68fdafb9fb7e5f0b2e4fc806e56f1a3126bad04194cba602dd92c5.exe
Resource
win7-20240215-en
General
-
Target
6ffdead52c68fdafb9fb7e5f0b2e4fc806e56f1a3126bad04194cba602dd92c5
-
Size
1.9MB
-
MD5
001f6aefa850c575018eaa792a0ebbc5
-
SHA1
69a44211fda244815a6f7b4480dada97f7778fe0
-
SHA256
6ffdead52c68fdafb9fb7e5f0b2e4fc806e56f1a3126bad04194cba602dd92c5
-
SHA512
24eeb6d51b6d3d2988e4eb39a0c0580013d7a3a1711d0d512a233c5a5ca1f5bb4d28b3e39e0e18990d83f592c3550e13cb905b7573c013155867b7221b9997d5
-
SSDEEP
24576:Z0ZIVjFxbxJMgQ5DIiJ1KxwflAbWgj8RuFwTXJsK63Ct6ij0V+uYzjy2QhL8Gbge:CC9pagQFIE1KbkYF+X70V+hy7hAI1U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 6ffdead52c68fdafb9fb7e5f0b2e4fc806e56f1a3126bad04194cba602dd92c5
Files
-
6ffdead52c68fdafb9fb7e5f0b2e4fc806e56f1a3126bad04194cba602dd92c5.exe windows:5 windows x86 arch:x86
a78e7a6400453cb536eea876b9168fc0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLocaleInfoA
PeekNamedPipe
ConvertThreadToFiber
InterlockedIncrement
InterlockedDecrement
GetNamedPipeHandleStateA
GetEnvironmentStringsW
WriteConsoleInputA
SetVolumeMountPointW
GetModuleHandleW
LocalFlags
ReadConsoleW
GetWindowsDirectoryA
GlobalAlloc
LoadLibraryW
GetLocaleInfoW
GetVersionExW
GetConsoleAliasW
WriteConsoleW
WritePrivateProfileSectionW
ReadFile
GetCompressedFileSizeA
GetStartupInfoW
VirtualUnlock
FindFirstFileA
GetCPInfoExW
GetLastError
SetLastError
GetProcAddress
HeapSize
IsValidCodePage
OpenWaitableTimerA
WriteConsoleA
LocalAlloc
FindFirstVolumeMountPointW
UpdateResourceW
FindNextFileW
GetCurrentDirectoryA
WaitForDebugEvent
GetVolumeNameForVolumeMountPointW
GlobalAddAtomW
GetProfileSectionW
CommConfigDialogW
CreateFileW
FlushFileBuffers
SetStdHandle
GetConsoleMode
GetCommandLineW
LocalUnlock
GetShortPathNameA
DebugActiveProcess
GetConsoleCP
SetFilePointer
WideCharToMultiByte
InterlockedExchange
MultiByteToWideChar
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
DeleteFileA
HeapReAlloc
GetCommandLineA
HeapSetInformation
GetCPInfo
RaiseException
RtlUnwind
HeapAlloc
LCMapStringW
IsProcessorFeaturePresent
ExitProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
HeapCreate
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetACP
GetOEMCP
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
WriteFile
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
CloseHandle
user32
CharToOemBuffA
CharUpperBuffW
GetDlgCtrlID
gdi32
GetCharWidthW
advapi32
DuplicateToken
winhttp
WinHttpCloseHandle
Sections
.text Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1.7MB - Virtual size: 6.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ