Static task
static1
Behavioral task
behavioral1
Sample
6e19797d7a237e9d130a38f15b926485287c6ce842679aba850725589242c763.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6e19797d7a237e9d130a38f15b926485287c6ce842679aba850725589242c763.exe
Resource
win10v2004-20240802-en
General
-
Target
6e19797d7a237e9d130a38f15b926485287c6ce842679aba850725589242c763
-
Size
94KB
-
MD5
e89d0d6ba6f99ea0ddcd3cb028c4e74f
-
SHA1
0c4d37e0947692161c4f162a58feea31d915d34f
-
SHA256
6e19797d7a237e9d130a38f15b926485287c6ce842679aba850725589242c763
-
SHA512
3efca72a2dc3fb7d7ad5e48b2ccfa5ce83a00368dd4b1de5c1399ce5df1e542a2167b7e78cec14c9432512e9437a7684a2bc1a6837279205419a38b4d6496325
-
SSDEEP
1536:Sdyql1M7wIIEuti7rEYivykYkpaWj0OL+G7mJAm/lGAuJMLF4vsnXWkW3H6:SdV1Z1i3QKqSGCJr/lkJ6FQsnv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6e19797d7a237e9d130a38f15b926485287c6ce842679aba850725589242c763
Files
-
6e19797d7a237e9d130a38f15b926485287c6ce842679aba850725589242c763.exe windows:4 windows x86 arch:x86
d2f8b54b620a14509449dc954d3f2b8b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
inet_addr
gethostbyname
WSAStartup
gethostname
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
kernel32
GetCurrentProcessId
GlobalAlloc
ReadFile
GetFileSize
CreateFileA
WriteFile
GetCurrentDirectoryA
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
lstrcatA
lstrlenA
OpenMutexA
lstrcmpiA
GetModuleFileNameA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetCommandLineA
CreateProcessA
GetProcAddress
LoadLibraryA
GetModuleHandleA
OpenEventA
CopyFileA
DeleteFileA
MultiByteToWideChar
WideCharToMultiByte
OpenProcess
VirtualFree
lstrcmpA
SetFilePointer
SetFileAttributesA
GetFileAttributesA
CreateDirectoryA
SetFileTime
GetFileTime
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetSystemTimeAsFileTime
DeviceIoControl
GetVolumeInformationA
GetDriveTypeA
GetLogicalDrives
GetVersionExA
GetTimeZoneInformation
GetSystemDefaultLCID
ResumeThread
SetPriorityClass
GetCurrentProcess
GetCurrentThread
SetThreadPriority
SetEndOfFile
GetOEMCP
LocalAlloc
LocalFree
SetEvent
CreateMutexA
GetLastError
CreateEventA
GlobalFree
CreateThread
CloseHandle
SetCurrentDirectoryA
WaitForSingleObject
Sleep
VirtualProtect
GetSystemInfo
LCMapStringA
LCMapStringW
HeapSize
VirtualAlloc
GetACP
GetLocaleInfoA
GetCPInfo
GetStringTypeW
GetStringTypeA
FlushFileBuffers
SetStdHandle
VirtualQuery
InterlockedExchange
RtlUnwind
InitializeCriticalSection
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
HeapAlloc
HeapFree
GetStartupInfoA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapDestroy
HeapCreate
HeapReAlloc
SetHandleCount
GetStdHandle
GetFileType
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
ExitProcess
TerminateProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
user32
wsprintfA
advapi32
QueryServiceStatus
GetUserNameA
ControlService
CreateServiceA
StartServiceA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
OpenSCManagerA
OpenServiceA
CloseServiceHandle
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
SetServiceStatus
ole32
CoCreateInstance
CoInitializeSecurity
CoInitializeEx
CoUninitialize
wininet
HttpQueryInfoA
InternetGetConnectedState
InternetOpenA
InternetSetCookieA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
urlmon
ObtainUserAgentString
iphlpapi
GetIpAddrTable
GetNetworkParams
GetAdaptersInfo
GetIfEntry
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 30KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 984B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ