Static task
static1
Behavioral task
behavioral1
Sample
6df1bd325f0f023b9a14c5d558bbb41849873e743c358a78c99aa131a2751658.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6df1bd325f0f023b9a14c5d558bbb41849873e743c358a78c99aa131a2751658.exe
Resource
win10v2004-20240412-en
General
-
Target
6df1bd325f0f023b9a14c5d558bbb41849873e743c358a78c99aa131a2751658
-
Size
236KB
-
MD5
24441691da50889edffe7994a237817c
-
SHA1
1d56627757d8ea4e7921a206ba1ca56f99664caa
-
SHA256
6df1bd325f0f023b9a14c5d558bbb41849873e743c358a78c99aa131a2751658
-
SHA512
913ac26a6bb174efa56077ea178685884d310060ccf5ee5191a62a916e199abda28ab21e67279a77ee48e347b4d77445e7878d18d6aac58145bf8d1fdde27d07
-
SSDEEP
3072:f5uW8A/PZQyfzC4rLCoZGDXN6Coo7on12W4Wgmg32hE0seKo0:hl8A/jkoZaX9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6df1bd325f0f023b9a14c5d558bbb41849873e743c358a78c99aa131a2751658
Files
-
6df1bd325f0f023b9a14c5d558bbb41849873e743c358a78c99aa131a2751658.exe windows:4 windows x64 arch:x64
a87b26438ac28aafcf5070cf14e34665
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
IsTextUnicode
RegCloseKey
RegCreateKeyExW
RegOpenKeyW
RegQueryValueExW
RegSetValueExW
comdlg32
ChooseFontW
FindTextW
GetFileTitleW
GetOpenFileNameW
GetSaveFileNameW
PrintDlgW
ReplaceTextW
gdi32
CreateFontIndirectW
DeleteDC
DeleteObject
EndDoc
EndPage
ExtTextOutW
GetDeviceCaps
GetTextExtentExPointW
GetTextExtentPoint32W
GetTextMetricsW
SelectObject
SetMapMode
StartDocW
StartPage
kernel32
CloseHandle
CreateFileW
ExitProcess
FindClose
FindFirstFileW
FormatMessageW
GetCPInfoExW
GetCommandLineA
GetCommandLineW
GetDateFormatW
GetFileSize
GetLocalTime
GetModuleHandleA
GetStartupInfoA
GetTimeFormatW
HeapAlloc
HeapFree
LocalFree
MulDiv
MultiByteToWideChar
ReadFile
SetEndOfFile
WideCharToMultiByte
WriteFile
lstrcmpW
shell32
DragAcceptFiles
DragFinish
DragQueryFileW
ShellAboutW
shlwapi
PathFindFileNameW
StrCmpNIW
StrCmpNW
StrRStrIW
StrStrIW
StrStrW
wnsprintfW
ucrtbase
__p___argc
__p___argv
_assert
_configure_narrow_argv
_get_initial_narrow_environment
_initialize_narrow_environment
_set_app_type
exit
memcpy
wcschr
user32
CheckMenuItem
CreateWindowExW
DefWindowProcW
DestroyWindow
DialogBoxParamW
DispatchMessageW
EnableMenuItem
EndDialog
GetClientRect
GetDlgItem
GetDlgItemInt
GetDlgItemTextW
GetMenu
GetMessageW
GetMonitorInfoW
GetParent
GetSystemMetrics
GetWindowPlacement
GetWindowTextLengthW
GetWindowTextW
InvalidateRect
IsClipboardFormatAvailable
IsDialogMessageW
LoadAcceleratorsW
LoadCursorW
LoadIconW
LoadImageW
LoadStringW
MessageBoxW
MonitorFromRect
PostMessageW
PostQuitMessage
RegisterClassExW
RegisterWindowMessageW
SendMessageW
SetActiveWindow
SetDlgItemInt
SetDlgItemTextW
SetFocus
SetWindowPos
SetWindowTextW
ShowWindow
TranslateAcceleratorW
TranslateMessage
UpdateWindow
WinHelpW
wsprintfW
Sections
.text Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 544B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 4KB - Virtual size: 516B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 4KB - Virtual size: 528B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 184KB - Virtual size: 182KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE