Static task
static1
Behavioral task
behavioral1
Sample
6ae32cd3b5a8a1dbb5464372ded370f31802fd1f5031795b43d662c64fc5b301.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6ae32cd3b5a8a1dbb5464372ded370f31802fd1f5031795b43d662c64fc5b301.exe
Resource
win10v2004-20240226-en
General
-
Target
6ae32cd3b5a8a1dbb5464372ded370f31802fd1f5031795b43d662c64fc5b301
-
Size
328KB
-
MD5
b5450c8553def4996426ab46996b2e55
-
SHA1
5221c2ce846d9cbc8ab73142b51414f31544289f
-
SHA256
6ae32cd3b5a8a1dbb5464372ded370f31802fd1f5031795b43d662c64fc5b301
-
SHA512
d92780976ce323005466a6e6014ea1c6520342786bc006964ce325944638d79986e8637bdb2823c0e21b9dc24b0662fe57ffb3847780bba241e36afbdc6a929a
-
SSDEEP
6144:zH/R2TDWKuPk+j1r/rDNHZK0D0j4ZhQQy0rQ2kbng6pJ1FY1PoAP/zQynabZ6Tl/:zfR23qj1zrDZDw4Mbngu1FY1wGabZU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6ae32cd3b5a8a1dbb5464372ded370f31802fd1f5031795b43d662c64fc5b301
Files
-
6ae32cd3b5a8a1dbb5464372ded370f31802fd1f5031795b43d662c64fc5b301.exe windows:4 windows x86 arch:x86
559e88246a166c4a117d3e6feeba3644
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyA
GetUserNameA
EqualSid
CopySid
GetLengthSid
SetSecurityDescriptorDacl
SetSecurityDescriptorOwner
InitializeSecurityDescriptor
AllocateAndInitializeSid
RegCreateKeyA
RegSetValueExA
user32
MsgWaitForMultipleObjects
PeekMessageA
SendMessageA
FindWindowA
GetForegroundWindow
GetCapture
GetClipboardOwner
GetQueueStatus
GetCursorPos
kernel32
SetEndOfFile
SetEnvironmentVariableA
CompareStringW
CompareStringA
HeapSize
InterlockedExchange
RtlUnwind
GetLocaleInfoA
SetFilePointer
GetCPInfo
GetOEMCP
GetTickCount
ReadFile
SetConsoleMode
GetConsoleMode
GetStdHandle
WriteFile
FreeLibrary
LoadLibraryA
GetProcAddress
CloseHandle
SetEvent
GetOverlappedResult
WaitForSingleObject
GetLastError
CreateEventA
CreateThread
GetVersionExA
GetSystemDirectoryA
FormatMessageA
GetSystemTimeAdjustment
GetSystemTime
GetProcessTimes
GetCurrentProcess
GetThreadTimes
GetCurrentThread
GlobalMemoryStatus
QueryPerformanceCounter
GetCurrentProcessId
FindClose
FindNextFileA
FindFirstFileA
GetWindowsDirectoryA
LocalFree
WaitNamedPipeA
CreateFileA
CreateNamedPipeA
ConnectNamedPipe
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
LocalAlloc
GetCurrentThreadId
GetFileType
CreateProcessA
SetHandleInformation
CreatePipe
OpenProcess
ClearCommBreak
SetCommTimeouts
SetCommState
GetCommState
SetCommBreak
ReleaseMutex
CreateMutexA
DeleteFileA
GetEnvironmentVariableA
GetLocalTime
GetModuleFileNameA
GetTimeFormatA
GetDateFormatA
HeapAlloc
HeapReAlloc
HeapFree
ExitProcess
GetModuleHandleA
TerminateProcess
GetSystemTimeAsFileTime
GetCommandLineA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
FlushFileBuffers
WideCharToMultiByte
GetTimeZoneInformation
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
LCMapStringA
LCMapStringW
SetHandleCount
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetStdHandle
GetACP
Sections
.text Size: 236KB - Virtual size: 234KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ