Static task
static1
Behavioral task
behavioral1
Sample
6df5741dbfe4d0e5a70ae4f6a7a90a108d9cc9202638750dede6bcfd4cc4a8d5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
6df5741dbfe4d0e5a70ae4f6a7a90a108d9cc9202638750dede6bcfd4cc4a8d5.exe
Resource
win11-20240419-en
General
-
Target
6df5741dbfe4d0e5a70ae4f6a7a90a108d9cc9202638750dede6bcfd4cc4a8d5
-
Size
810KB
-
MD5
593710f35e2b391a1e1effd45dabc823
-
SHA1
dce82ea3626304b263def4e8482192cf5f379f6c
-
SHA256
6df5741dbfe4d0e5a70ae4f6a7a90a108d9cc9202638750dede6bcfd4cc4a8d5
-
SHA512
0cc05c7e57eb88d8a4ba7a2d6e7bb9453a076bcfce2fce5d096c5601d0fd61ccbeca1171ab3f4d1f3567a16145e51d1c73a22b45d0082c05e99c8d1dd095ec7f
-
SSDEEP
12288:x35ebXY3JOc+5OEj1CeAIstAFeZ/kroq71teGUZRMkEQHmjTk6zUkOZx:PXAc+Jj1+IsC0ZdGUZRhEPlQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6df5741dbfe4d0e5a70ae4f6a7a90a108d9cc9202638750dede6bcfd4cc4a8d5
Files
-
6df5741dbfe4d0e5a70ae4f6a7a90a108d9cc9202638750dede6bcfd4cc4a8d5.exe windows:5 windows x86 arch:x86
9e05030e93ad507f08fdf7235d34bfbc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalAlloc
GetLastError
SetLastError
ReadProcessMemory
GetTickCount
_lopen
OpenEventA
LoadLibraryW
LoadLibraryExW
GetModuleFileNameW
GetModuleHandleW
GetSystemDirectoryW
CreateDirectoryW
SetFileAttributesW
GetVolumeInformationA
IsBadStringPtrA
GetProcAddress
CommConfigDialogA
SetComputerNameA
SetInformationJobObject
FindNextVolumeA
FindFirstVolumeMountPointW
SetVolumeMountPointA
GetOEMCP
GetCalendarInfoA
GetNumberFormatA
GetStringTypeA
SetConsoleCursorInfo
AllocConsole
AddConsoleAliasW
CloseHandle
WriteConsoleW
SetFilePointerEx
SetStdHandle
BuildCommDCBW
InterlockedExchange
EncodePointer
DecodePointer
RaiseException
RtlUnwind
GetCommandLineW
IsProcessorFeaturePresent
HeapAlloc
HeapFree
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
HeapSize
GetCurrentThreadId
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
IsDebuggerPresent
LCMapStringW
EnterCriticalSection
LeaveCriticalSection
IsValidCodePage
GetACP
GetCPInfo
HeapReAlloc
OutputDebugStringW
GetStringTypeW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
CreateFileW
user32
GetSysColorBrush
SetMenu
DdeKeepStringHandle
gdi32
GetCharWidthA
Sections
.text Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 593KB - Virtual size: 40.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ