Static task
static1
Behavioral task
behavioral1
Sample
06f1db7e2d13b39634d840cdd5fdf8620d7b8055daa0c99b59a35f493e045b56.exe
Resource
win7-20240221-en
General
-
Target
06f1db7e2d13b39634d840cdd5fdf8620d7b8055daa0c99b59a35f493e045b56
-
Size
2.8MB
-
MD5
f310ba4fb49fc16adcdbf496cf10d0b9
-
SHA1
da20ab2693953887be2733463dd611fb7a663fb5
-
SHA256
06f1db7e2d13b39634d840cdd5fdf8620d7b8055daa0c99b59a35f493e045b56
-
SHA512
6f00d2814f3d0f9f005fe8418c8e0a8984e122a4936afa77b95890d8b0885e9f613df5fc4183eace60492ceb15d4e91e6775e77bebf38c9b7e6e76cb44af60a2
-
SSDEEP
49152:TXsWHXechxxMKou3Sjd140gihhMP+W70cjib1FZTeAL8z:TlHX5hxxbou6sYjW7LJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 06f1db7e2d13b39634d840cdd5fdf8620d7b8055daa0c99b59a35f493e045b56
Files
-
06f1db7e2d13b39634d840cdd5fdf8620d7b8055daa0c99b59a35f493e045b56.exe windows:5 windows x86 arch:x86
9411496a5bef499d7e37928a49b74029
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
kernel32
LeaveCriticalSection
DeleteCriticalSection
SetEvent
WaitForSingleObject
CreateEventW
GetLocalTime
GetLastError
GetFullPathNameW
GetCurrentDirectoryW
IsBadReadPtr
LoadLibraryA
lstrlenW
GetNativeSystemInfo
SetLastError
GetProcessHeap
HeapFree
HeapAlloc
VirtualProtect
VirtualFree
VirtualAlloc
WritePrivateProfileStringW
GetPrivateProfileStringW
Process32NextW
EnterCriticalSection
FreeLibraryAndExitThread
ExitThread
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
SystemTimeToFileTime
GetSystemTime
ReadConsoleA
SetConsoleMode
ConvertThreadToFiber
ConvertFiberToThread
CreateFiber
DeleteFiber
SwitchToFiber
GetVersionExW
LocalAlloc
LocalFree
GetCurrentProcess
GetModuleFileNameW
OutputDebugStringW
InitializeCriticalSectionAndSpinCount
ResetEvent
WaitForSingleObjectEx
GetModuleHandleW
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
TerminateProcess
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetPrivateProfileIntW
GetEnvironmentVariableW
GetTempPathW
CreateDirectoryW
RemoveDirectoryW
Process32FirstW
MoveFileExW
GlobalAlloc
GlobalFree
GetExitCodeProcess
CreateProcessW
InitializeCriticalSection
ProcessIdToSessionId
DecodePointer
HeapReAlloc
HeapSize
RaiseException
GetFileSize
ReadFile
MultiByteToWideChar
WideCharToMultiByte
GetSystemInfo
GetTickCount
WriteFile
GetFileAttributesW
CopyFileW
FileTimeToSystemTime
GetVolumeInformationW
OutputDebugStringA
SetPriorityClass
RtlUnwind
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetStdHandle
GetACP
GetStringTypeW
WriteConsoleW
GetFileType
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
GetConsoleMode
ReadConsoleW
SetFilePointerEx
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetConsoleCtrlHandler
SetStdHandle
GetConsoleCP
FlushFileBuffers
SetEndOfFile
VerifyVersionInfoA
GetSystemDirectoryA
GetModuleHandleA
VerSetConditionMask
ExpandEnvironmentStringsA
PeekNamedPipe
WaitForMultipleObjects
SleepEx
FormatMessageA
SwitchToThread
TerminateThread
CreateThread
FindNextFileW
FindFirstFileW
lstrcpyW
FindClose
GetLongPathNameW
CreateToolhelp32Snapshot
DeleteFileW
CreateFileW
GetSystemDirectoryW
LoadLibraryW
CloseHandle
DeviceIoControl
Sleep
OpenProcess
GetProcAddress
FreeLibrary
user32
MessageBoxW
GetUserObjectInformationW
GetProcessWindowStation
PostMessageW
FindWindowW
LoadStringW
wsprintfW
advapi32
CryptGenRandom
CryptReleaseContext
LookupPrivilegeValueW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetTokenInformation
RegSetValueExW
LookupAccountSidW
GetTokenInformation
DuplicateTokenEx
StartServiceCtrlDispatcherW
SetServiceStatus
RegisterServiceCtrlHandlerW
ReportEventW
RegisterEventSourceW
DeregisterEventSource
RegCreateKeyExW
ImpersonateLoggedOnUser
RevertToSelf
RegQueryValueExW
RegOpenKeyExW
RegOpenKeyW
RegEnumKeyW
RegDeleteKeyW
RegCloseKey
CreateProcessAsUserW
OpenProcessToken
CryptAcquireContextW
shell32
SHChangeNotify
SHGetFolderPathW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHGetSpecialFolderPathW
ole32
CoCreateInstance
CoUninitialize
CoTaskMemFree
CoInitialize
shlwapi
SHSetValueW
PathFileExistsW
SHDeleteKeyW
SHDeleteValueW
SHGetValueW
wtsapi32
WTSQueryUserToken
psapi
EnumProcesses
GetProcessImageFileNameW
wininet
InternetCloseHandle
InternetQueryOptionW
HttpQueryInfoW
InternetOpenW
InternetSetOptionW
InternetOpenUrlW
InternetReadFile
wldap32
ord143
ord46
ord211
ord60
ord50
ord41
ord22
ord26
ord27
ord32
ord33
ord35
ord79
ord30
ord200
ord301
ws2_32
WSAStartup
gethostname
ioctlsocket
listen
accept
sendto
recvfrom
freeaddrinfo
getaddrinfo
WSAIoctl
socket
setsockopt
ntohs
recv
htons
getsockopt
WSACleanup
send
WSAGetLastError
__WSAFDIsSet
select
getsockname
getpeername
connect
closesocket
bind
WSASetLastError
Sections
.text Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 539KB - Virtual size: 539KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 20KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 425KB - Virtual size: 424KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 155KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE