Static task
static1
Behavioral task
behavioral1
Sample
6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe
Resource
win11-20240412-en
Behavioral task
behavioral2
Sample
6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe
Resource
win10-20240319-en
Behavioral task
behavioral4
Sample
6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe
Resource
win10v2004-20240412-en
General
-
Target
6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239
-
Size
434KB
-
MD5
556c756b428b0a6f1516de031c3bfdb3
-
SHA1
d4a8195611ac93a268b0ebdc14319a75de856725
-
SHA256
6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239
-
SHA512
0e6ffc8dd5dda62a3936a5ea311a9e7007f27ead2f86f9f3f17510a78d2181b16473c69b3b5aa465f68042adef0d95fa8403f9d5bb106dbb4896750caef60a26
-
SSDEEP
12288:rXPcLcbGfVylwG/ZDCK/ScBXo8TsyMkKMY8m7WOK9SATTsx/SA/WegYfdNbrqnuh:rXh6XcBXo8TsL8Y8m/ATTySA/DrfdNb7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239
Files
-
6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe windows:5 windows x86 arch:x86
cd3fc0dde37bf2787f0f054ef3b5a350
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
_vsnprintf
strtoul
_snprintf
sscanf
sprintf
_strnicmp
tolower
_wcsicmp
strrchr
abs
strncmp
atol
isprint
memcpy
memmove
isspace
strlen
strchr
atoi
strncpy
strcpy
_chkstk
strstr
isalnum
wcschr
strcmp
wcslen
memcmp
wcsstr
_stricmp
_wcsnicmp
memset
ws2_32
sendto
recvfrom
connect
accept
getsockname
inet_ntoa
ntohs
closesocket
htonl
htons
socket
gethostbyname
listen
freeaddrinfo
getaddrinfo
ioctlsocket
select
WSAStartup
send
recv
__WSAFDIsSet
inet_pton
getsockopt
gethostname
shutdown
inet_addr
getpeername
WSAGetLastError
setsockopt
bind
kernel32
OpenProcess
GetProcessTimes
QueryPerformanceCounter
InterlockedDecrement
InterlockedIncrement
GetNativeSystemInfo
UnregisterWait
GetSystemTime
IsWow64Process
Sleep
CreateThread
CloseHandle
TerminateThread
LeaveCriticalSection
EnterCriticalSection
GlobalFree
GlobalUnlock
WriteFile
CreateFileW
GlobalLock
GlobalAlloc
FindClose
DeleteFileW
FindNextFileW
lstrcmpW
FindFirstFileW
lstrcatW
lstrcpyW
ExitThread
GetLocalTime
InitializeCriticalSection
WaitForSingleObject
lstrcpyA
DeleteCriticalSection
GetCurrentThread
GetTickCount
lstrlenA
FreeLibrary
GetProcAddress
LoadLibraryA
LocalFree
CopyFileA
DeleteFileA
SetCurrentDirectoryA
GetCurrentDirectoryA
GetFileAttributesA
GetPrivateProfileStringA
ExpandEnvironmentStringsA
TerminateProcess
CreateProcessA
lstrlenW
ExpandEnvironmentStringsW
WideCharToMultiByte
CreateFileA
SetCurrentDirectoryW
GetCurrentDirectoryW
ExitProcess
GetLastError
GetPrivateProfileStringW
GetPrivateProfileIntW
lstrcatA
GetWindowsDirectoryA
lstrcmpA
GetModuleHandleA
CreateProcessW
SetLastError
lstrcpynW
CreateEventW
SetEvent
TryEnterCriticalSection
GetModuleHandleW
ResetEvent
ResumeThread
CreateDirectoryW
FindNextFileA
FindFirstFileA
SetEndOfFile
ReadFile
GetFileSize
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetCurrentProcessId
GetComputerNameA
GetCurrentProcess
ReadProcessMemory
GetProcessHeap
HeapAlloc
HeapReAlloc
HeapFree
VirtualQuery
VirtualFreeEx
VirtualAllocEx
Process32Next
Process32First
DeviceIoControl
GetVersionExW
ReleaseMutex
OpenMutexW
CreateMutexW
LocalAlloc
Wow64RevertWow64FsRedirection
Wow64DisableWow64FsRedirection
MultiByteToWideChar
LoadLibraryW
CreateEventA
RegisterWaitForSingleObject
OpenEventA
lstrcmpiW
CreateMutexA
QueryPerformanceFrequency
GetVersionExA
WriteProcessMemory
GlobalFindAtomW
VirtualFree
CreateRemoteThread
VirtualQueryEx
GetProcessHandleCount
VirtualAlloc
VirtualProtectEx
SetFilePointer
DuplicateHandle
crypt32
CryptUnprotectData
user32
GetWindowPlacement
PostMessageA
SendMessageA
WindowFromPoint
SetClipboardData
EmptyClipboard
CloseClipboard
GetClipboardData
IsClipboardFormatAvailable
OpenClipboard
CreateDesktopA
OpenDesktopA
CharNextA
PostThreadMessageW
CallNextHookEx
ToAscii
MapVirtualKeyW
GetWindowThreadProcessId
UnhookWindowsHookEx
DispatchMessageW
TranslateMessage
GetMessageW
FindWindowA
DrawIconEx
GetIconInfo
GetCursorInfo
PostMessageW
EnumWindows
IsWindow
IsWindowVisible
GetWindowLongA
SetWindowLongA
GetTopWindow
MenuItemFromPoint
GetWindowRect
PrintWindow
GetSystemMetrics
GetDesktopWindow
GetDC
ReleaseDC
GetForegroundWindow
GetWindowTextA
VkKeyScanA
SetCursorPos
SendInput
RealGetWindowClassA
PtInRect
GetMenuItemID
MoveWindow
ScreenToClient
ChildWindowFromPoint
SetWindowsHookExA
SetThreadDesktop
GetWindow
gdi32
GetDIBits
SelectPalette
GetStockObject
GetObjectW
DeleteDC
GetDeviceCaps
CreateDCW
DeleteObject
StretchBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
BitBlt
SetStretchBltMode
CreateDIBSection
SetDIBColorTable
RealizePalette
advapi32
GetSidSubAuthorityCount
GetSidLengthRequired
InitializeSid
GetSidSubAuthority
InitializeSecurityDescriptor
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
RegNotifyChangeKeyValue
GetTokenInformation
ConvertSidToStringSidA
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
GetUserNameA
CryptAcquireContextW
CryptCreateHash
CryptHashData
CryptGetHashParam
CryptDestroyHash
CryptReleaseContext
shell32
SHFileOperationW
SHGetFolderPathA
SHGetSpecialFolderPathA
SHGetFolderPathAndSubDirW
ole32
StringFromGUID2
CoInitialize
CoCreateInstance
CoUninitialize
CoCreateGuid
shlwapi
PathCombineA
Sections
.text Size: 250KB - Virtual size: 249KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 144KB - Virtual size: 143KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 27KB - Virtual size: 218KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ