Static task
static1
Behavioral task
behavioral1
Sample
a6aa600a26edc14d1f71fed709d929ef06c3c0822e5737bbd166a49520c8ab82.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a6aa600a26edc14d1f71fed709d929ef06c3c0822e5737bbd166a49520c8ab82.exe
Resource
win10v2004-20240802-en
General
-
Target
a6aa600a26edc14d1f71fed709d929ef06c3c0822e5737bbd166a49520c8ab82
-
Size
609KB
-
MD5
666aa98dacc7a1454d2c92c2ddf16190
-
SHA1
34136cae1dc66b9477669d712cbae0dd8e12e136
-
SHA256
a6aa600a26edc14d1f71fed709d929ef06c3c0822e5737bbd166a49520c8ab82
-
SHA512
c90ac5a36b1a50ac514979c28d2c1f93fd2968b7840933efeaba78c79f69eddb81c735509b7212cc98a8f7ac8c1e31c59c5b4fe5018dcacb95beb05650c51afe
-
SSDEEP
12288:TMLljc0K4AxtuyyNXz37eHm1x+QEBs4DcX5ERM75ER8:TMBjc0K4AxtjW2Hoxegof
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a6aa600a26edc14d1f71fed709d929ef06c3c0822e5737bbd166a49520c8ab82
Files
-
a6aa600a26edc14d1f71fed709d929ef06c3c0822e5737bbd166a49520c8ab82.exe windows:6 windows x64 arch:x64
e367a5a4c7762686c89b6c97b4b6244e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
MulDiv
SizeofResource
InitializeCriticalSection
GetCurrentThreadId
FreeResource
LockResource
LoadResource
FindResourceW
DeleteCriticalSection
LoadLibraryW
FreeLibrary
SetLastError
GetCommandLineW
GetCurrentProcess
TerminateProcess
MultiByteToWideChar
GlobalFlags
GetSystemInfo
CreateProcessW
VirtualQuery
HeapFree
HeapReAlloc
HeapAlloc
GetProcessHeap
SetEvent
ResetEvent
GetSystemTimeAsFileTime
EnterCriticalSection
SetEndOfFile
WriteConsoleW
HeapSize
FlushFileBuffers
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
LCMapStringW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
ReadConsoleW
GetFileSizeEx
GetConsoleMode
GetConsoleOutputCP
GetFileType
SetFilePointerEx
GetStdHandle
GetCommandLineA
GetModuleHandleExW
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
EncodePointer
RaiseException
RtlPcToFileHeader
RtlUnwindEx
InitializeSListHead
QueryPerformanceCounter
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
WaitForSingleObjectEx
InitializeCriticalSectionAndSpinCount
TryEnterCriticalSection
GetLocalTime
IsDebuggerPresent
FindNextFileW
GetModuleFileNameW
GetTickCount
DeleteFileW
CreateFileW
GetLogicalDriveStringsW
WideCharToMultiByte
GetComputerNameW
CreateEventW
ExitProcess
OpenEventW
CloseHandle
GetCurrentProcessId
GetProcAddress
GetModuleHandleW
FindClose
LeaveCriticalSection
FindFirstFileW
GetFileAttributesW
GetLastError
SetFilePointer
ReadFile
WriteFile
user32
MonitorFromWindow
WaitForInputIdle
GetWindowThreadProcessId
GetMessageW
TranslateMessage
DispatchMessageW
wsprintfW
ReleaseDC
GetDC
LoadImageW
GetParent
GetDesktopWindow
LoadCursorW
LoadIconW
LoadStringW
GetWindowLongPtrW
SendMessageW
MessageBoxW
EnumWindows
gdi32
SetDIBColorTable
CreateCompatibleDC
CreateDIBSection
GetDeviceCaps
DeleteDC
GetObjectW
DeleteObject
SelectObject
ole32
CreateStreamOnHGlobal
CoUninitialize
CoInitializeEx
comctl32
ImageList_AddMasked
ImageList_Create
ImageList_Destroy
bcrypt
BCryptOpenAlgorithmProvider
BCryptCloseAlgorithmProvider
BCryptGetProperty
BCryptGenerateSymmetricKey
BCryptEncrypt
BCryptDestroyKey
BCryptImportKeyPair
BCryptSetProperty
gdiplus
GdipDisposeImage
GdipGetImagePixelFormat
GdipFree
GdipBitmapLockBits
GdipDrawImageRectI
GdipGetImageGraphicsContext
GdipDeleteGraphics
GdipGetImagePalette
GdipSetCompositingMode
GdipGetImageWidth
GdipCreateBitmapFromFile
GdipCreateBitmapFromScan0
GdipAlloc
GdipBitmapUnlockBits
GdipCloneImage
GdipGetImagePaletteSize
GdipGetImageHeight
GdiplusShutdown
GdiplusStartup
GdipCreateBitmapFromStream
shlwapi
PathFileExistsW
ws2_32
WSACleanup
Sections
.text Size: 244KB - Virtual size: 244KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 212KB - Virtual size: 212KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ