Static task
static1
Behavioral task
behavioral1
Sample
6a2a1bebd1d3f3e851b5d7860d3369e8f83687c70f897fa80624b54ce0d1c280.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
6a2a1bebd1d3f3e851b5d7860d3369e8f83687c70f897fa80624b54ce0d1c280.exe
Resource
win10v2004-20240226-en
General
-
Target
6a2a1bebd1d3f3e851b5d7860d3369e8f83687c70f897fa80624b54ce0d1c280
-
Size
85KB
-
MD5
dcb081e19ca6b35a2307aa99516b5de6
-
SHA1
d712b07d81a86321d936302607d8902522fbb7f7
-
SHA256
6a2a1bebd1d3f3e851b5d7860d3369e8f83687c70f897fa80624b54ce0d1c280
-
SHA512
df542c1b870ae860219532d40d66d86505c9745477fb8c4c9d9891d157d7a87d7043622df6b1a1133c99beeaf0c8ece0c21b6122b802ee248cd09045efd26817
-
SSDEEP
1536:D00URPnKfZrT2DawRR8JfP3aZB355B/CYTjipvF2a:D00URSfsGyR3ZB355BqYvQd2a
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6a2a1bebd1d3f3e851b5d7860d3369e8f83687c70f897fa80624b54ce0d1c280
Files
-
6a2a1bebd1d3f3e851b5d7860d3369e8f83687c70f897fa80624b54ce0d1c280.exe windows:5 windows x86 arch:x86
3ce527d19d124ee8e90816b89714febc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileSize
CreateFileA
WriteFile
SetFileAttributesA
GetModuleHandleA
GetCurrentProcess
WideCharToMultiByte
CreateMutexA
GetLocalTime
GetSystemDirectoryA
IsBadStringPtrA
HeapSize
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
ReadFile
MultiByteToWideChar
LCMapStringA
HeapReAlloc
VirtualAlloc
HeapAlloc
InitializeCriticalSectionAndSpinCount
EnterCriticalSection
LeaveCriticalSection
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
HeapFree
VirtualFree
HeapCreate
InterlockedDecrement
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
DeleteCriticalSection
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
CloseHandle
CompareStringA
ExitProcess
GetVersionExA
GlobalMemoryStatus
GetComputerNameA
GetLastError
GetCurrentThreadId
GetShortPathNameA
lstrcmpiA
LoadLibraryA
FreeLibrary
GetProcAddress
DeleteFileA
GetFileAttributesA
GetTempPathA
GetWindowsDirectoryA
lstrcpyA
lstrcatA
lstrlenA
IsBadReadPtr
IsBadWritePtr
CreateThread
lstrcpynA
GetCommandLineA
LocalAlloc
LocalFree
WaitForSingleObject
GetTickCount
Sleep
GetModuleFileNameA
LCMapStringW
FreeEnvironmentStringsA
GetStdHandle
GetModuleHandleW
RtlUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
user32
OpenInputDesktop
GetUserObjectInformationA
CloseDesktop
wsprintfA
wvsprintfA
PeekMessageA
DispatchMessageA
TranslateMessage
advapi32
StartServiceCtrlDispatcherA
CreateServiceA
StartServiceA
RegOpenKeyA
RegCreateKeyA
RegSetValueExA
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegisterServiceCtrlHandlerA
OpenSCManagerA
OpenServiceA
ControlService
DeleteService
CloseServiceHandle
SetServiceStatus
GetUserNameA
shell32
ShellExecuteA
ws2_32
gethostbyaddr
WSAGetLastError
WSAEnumNetworkEvents
WSAStartup
WSACleanup
WSACloseEvent
getpeername
ntohs
send
recv
inet_addr
closesocket
gethostbyname
htons
connect
inet_ntoa
WSACreateEvent
socket
WSAEventSelect
WSAWaitForMultipleEvents
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ