Static task
static1
Behavioral task
behavioral1
Sample
f6ed1a1705d0300f85741a5f199fd46dfb074226eb220de342249b0d2e279c48.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f6ed1a1705d0300f85741a5f199fd46dfb074226eb220de342249b0d2e279c48.exe
Resource
win10v2004-20240412-en
General
-
Target
f6ed1a1705d0300f85741a5f199fd46dfb074226eb220de342249b0d2e279c48
-
Size
180KB
-
MD5
3768fa5273dc8e79e68fd580a16e5980
-
SHA1
0a5edefaa703430e8dca9f2d17b8b144819cc3e6
-
SHA256
f6ed1a1705d0300f85741a5f199fd46dfb074226eb220de342249b0d2e279c48
-
SHA512
e89478ac6cf037fb1e13ea9c68b216a16f8098d94f65197531793dba85018c6190e37ce99d0243766830046828f181824f65459f9681f321ffef87d5d5d2b7ec
-
SSDEEP
3072:E6Z1bk1FVAHcTVO4O9fcSNV5SpLAO01smQYwhCf7:PZlkhLgfRV5kM31B
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f6ed1a1705d0300f85741a5f199fd46dfb074226eb220de342249b0d2e279c48
Files
-
f6ed1a1705d0300f85741a5f199fd46dfb074226eb220de342249b0d2e279c48.exe windows:4 windows x86 arch:x86
79b96456f9efc94c33ade5e8ec421b2f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
CloseHandle
CreateFileA
GetModuleFileNameA
Sleep
CreateThread
SetLastError
GetLastError
TerminateProcess
OpenProcess
ReadFile
GetFileSize
WriteFile
SetFilePointer
SetFileAttributesA
GetLocalTime
ResumeThread
SetThreadContext
VirtualProtectEx
WriteProcessMemory
VirtualAllocEx
IsBadReadPtr
FreeLibrary
GetProcAddress
LoadLibraryA
ReadProcessMemory
GetThreadContext
CreateProcessA
GetCurrentDirectoryA
GetWindowsDirectoryA
MapViewOfFile
OpenFileMappingA
GetCommandLineA
GetModuleHandleA
GetTempFileNameA
GetTempPathA
DeleteFileA
CopyFileA
EndUpdateResourceA
UpdateResourceA
BeginUpdateResourceA
GetProcessVersion
lstrcmpiA
WideCharToMultiByte
MultiByteToWideChar
user32
MessageBoxA
msvcrt
memcpy
??3@YAXPAX@Z
ftell
fclose
fread
fseek
strcpy
__CxxFrameHandler
_wcsnicmp
wcscpy
fwrite
time
memset
strcat
strlen
??2@YAPAXI@Z
_strnicmp
fopen
wcslen
_itoa
_wcsicmp
msvcp60
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@ABV01@@Z
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@PBGABV?$allocator@G@1@@Z
??1?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@XZ
?c_str@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QBEPBGXZ
Sections
.text Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.htext Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE