Static task
static1
Behavioral task
behavioral1
Sample
6bf4bba0e88884b274b28ef8f1a59d4b97796aa0082197becd4f6bc2e546260c.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6bf4bba0e88884b274b28ef8f1a59d4b97796aa0082197becd4f6bc2e546260c.exe
Resource
win10v2004-20240419-en
General
-
Target
6bf4bba0e88884b274b28ef8f1a59d4b97796aa0082197becd4f6bc2e546260c.exe
-
Size
36KB
-
MD5
3817edca92025ebe8512516b7dd77e80
-
SHA1
d53a16490b490386af95b9124685ccbc6ec247b6
-
SHA256
6bf4bba0e88884b274b28ef8f1a59d4b97796aa0082197becd4f6bc2e546260c
-
SHA512
ff26a2d5fcc4a4d67f154b67f17730287a2ab01730a652aa36aae96b0be6bef58d5118c68b61a7600058a526129a285bbf8600898b5411eaa2b98b4a10f301dc
-
SSDEEP
768:8Fw+H/natWvv3yaDivS3991Eadu/8sm3qGHUO5+WiY:1+fnIWvv3sUjvdu/8cO5g
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6bf4bba0e88884b274b28ef8f1a59d4b97796aa0082197becd4f6bc2e546260c.exe
Files
-
6bf4bba0e88884b274b28ef8f1a59d4b97796aa0082197becd4f6bc2e546260c.exe.exe windows:6 windows x64 arch:x64
8b8e08459f660afd9b9c68a407212475
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
InitializeCriticalSectionEx
WaitForSingleObject
GetLastError
LoadLibraryW
CreateThread
GetProcAddress
DeleteCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcess
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
InitializeSListHead
GetCurrentThreadId
OutputDebugStringW
IsDebuggerPresent
VirtualProtect
msvcp140
?good@ios_base@std@@QEBA_NXZ
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
?flags@ios_base@std@@QEBAHXZ
?width@ios_base@std@@QEBA_JXZ
?width@ios_base@std@@QEAA_J_J@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z
?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADXZ
?rdbuf@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBAPEAV?$basic_streambuf@DU?$char_traits@D@std@@@2@XZ
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
_Xtime_get_ticks
_Thrd_sleep
?_Xlength_error@std@@YAXPEBD@Z
?_Xout_of_range@std@@YAXPEBD@Z
?uncaught_exception@std@@YA_NXZ
?tie@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBAPEAV?$basic_ostream@DU?$char_traits@D@std@@@2@XZ
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
api-ms-win-core-memory-l1-1-4
QueryVirtualMemoryInformation
crypt32
CryptStringToBinaryA
vcruntime140
__C_specific_handler
_CxxThrowException
__std_exception_destroy
memchr
memcmp
memcpy
memmove
__CxxFrameHandler3
__std_exception_copy
memset
api-ms-win-crt-string-l1-1-0
strlen
api-ms-win-crt-heap-l1-1-0
free
_set_new_mode
_callnewh
malloc
api-ms-win-crt-runtime-l1-1-0
exit
_exit
_seh_filter_exe
__p___argc
_cexit
_initterm_e
_register_thread_local_exe_atexit_callback
_initterm
_crt_atexit
terminate
_initialize_narrow_environment
_get_initial_narrow_environment
_c_exit
_invalid_parameter_noinfo_noreturn
_set_app_type
_configure_narrow_argv
_register_onexit_function
__p___argv
_initialize_onexit_table
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__p__commode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 472B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 76B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ