Static task
static1
Behavioral task
behavioral1
Sample
206c68c4ffff81fe9a7be5d1c0ab6747f70cd861fca85daf4b48eb95af831973.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
206c68c4ffff81fe9a7be5d1c0ab6747f70cd861fca85daf4b48eb95af831973.exe
Resource
win10v2004-20240802-en
General
-
Target
206c68c4ffff81fe9a7be5d1c0ab6747f70cd861fca85daf4b48eb95af831973
-
Size
740KB
-
MD5
ba4bf3abc8cbe8ae8aaf76e61bd2349f
-
SHA1
18e301e0d0a7bc2d036c943f1912ca3ac95ff2a4
-
SHA256
206c68c4ffff81fe9a7be5d1c0ab6747f70cd861fca85daf4b48eb95af831973
-
SHA512
182e5f39c9edfca372a84cbdede82e10ea0b73f5233316c72eacf6c8a2faab9180c514c349c2b4988df54d8fb42493bb1aeebbaa9207c02f2123e41e15796a46
-
SSDEEP
12288:ZkhpC18mcSanWod16OkO4DZG40XPzdG4H7nOPo:ZkhpNqaeIo4i
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 206c68c4ffff81fe9a7be5d1c0ab6747f70cd861fca85daf4b48eb95af831973
Files
-
206c68c4ffff81fe9a7be5d1c0ab6747f70cd861fca85daf4b48eb95af831973.exe windows:4 windows x86 arch:x86
8ce4489350445efeae691c183189bbc7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
VirtualFree
InterlockedExchange
CloseHandle
GetTickCount
GetProcAddress
GetLastError
CreateThread
VirtualAllocEx
VirtualFreeEx
VirtualAlloc
InterlockedIncrement
SetStdHandle
SetFilePointer
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
HeapFree
RtlUnwind
WriteFile
IsBadWritePtr
IsBadReadPtr
HeapValidate
GetCPInfo
GetACP
GetOEMCP
HeapAlloc
HeapReAlloc
LoadLibraryA
DebugBreak
InterlockedDecrement
OutputDebugStringA
FlushFileBuffers
user32
EnableWindow
ShowWindow
GetActiveWindow
LoadIconA
GetFocus
msacm32
acmFilterTagDetailsA
Sections
.text Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 352KB - Virtual size: 349KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 392KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.shell Size: 320KB - Virtual size: 320KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ