Static task
static1
Behavioral task
behavioral1
Sample
6a175a326cf7c23bf02de53b368aee97bd839c731ca6c126cecf6526bdd05af7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6a175a326cf7c23bf02de53b368aee97bd839c731ca6c126cecf6526bdd05af7.exe
Resource
win10v2004-20240802-en
General
-
Target
6a175a326cf7c23bf02de53b368aee97bd839c731ca6c126cecf6526bdd05af7
-
Size
280KB
-
MD5
1640c04c88668afbd88cec0f6fab33a8
-
SHA1
351954b67e9add6394ff3574559fd8ce27d4abb8
-
SHA256
6a175a326cf7c23bf02de53b368aee97bd839c731ca6c126cecf6526bdd05af7
-
SHA512
89cfc41f3576f24281aff9ba6571f13f3888c7d049b97d29b43ef0722362897a96b53eef8e7c5cd0375007aba2023a29cf28f9321193fb62812146b93de28c8b
-
SSDEEP
3072:V9MOXMXNJgx17DJw2KQarV0xEE5ULonLbKLqXT8wS4xZuadd:xyKxZ6Lh7E5UULbSENS4xZuadd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6a175a326cf7c23bf02de53b368aee97bd839c731ca6c126cecf6526bdd05af7
Files
-
6a175a326cf7c23bf02de53b368aee97bd839c731ca6c126cecf6526bdd05af7.exe windows:4 windows x64 arch:x64
c56970d10552db0701ef3a2a516d4b7a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegCloseKey
RegCreateKeyExW
RegGetValueW
RegOpenKeyW
RegQueryValueExW
RegSetValueExA
RegSetValueExW
gdi32
CreateCompatibleDC
CreateDIBSection
CreateFontIndirectW
DeleteDC
DeleteObject
GetDeviceCaps
GetTextExtentPointA
GetTextExtentPointW
GetTextMetricsW
SelectObject
SetBkMode
SetTextColor
kernel32
CloseHandle
CompareStringW
CreateEventW
CreateFileW
CreateMutexW
CreateProcessW
CreateThread
DelayLoadFailureHook
DuplicateHandle
EnterCriticalSection
ExitProcess
ExpandEnvironmentStringsW
FindClose
FindFirstFileW
FindNextFileW
FreeLibrary
GetCommandLineW
GetFullPathNameW
GetModuleHandleW
GetOverlappedResult
GetProcAddress
GetStartupInfoW
GetTickCount
HeapAlloc
HeapReAlloc
InitializeCriticalSection
IsBadStringPtrA
IsBadStringPtrW
LeaveCriticalSection
LoadLibraryW
MapViewOfFile
MulDiv
MultiByteToWideChar
OpenProcess
ReadDirectoryChangesW
ResolveDelayLoadedAPI
UnmapViewOfFile
WaitForMultipleObjects
WaitForSingleObject
lstrcmpiW
ntdll
_vsnprintf
rpcrt4
UuidCreate
ucrtbase
__acrt_iob_func
__p___argc
__p___wargv
__stdio_common_vsprintf
__stdio_common_vswprintf
_assert
_configure_wide_argv
_get_initial_wide_environment
_initialize_wide_environment
_set_app_type
_strdup
_wcsicmp
calloc
exit
free
fwrite
getenv
iswspace
malloc
memcmp
memcpy
memmove
memset
realloc
strchr
strcmp
strcspn
strlen
wcschr
wcscmp
wcscpy
wcslen
wcsncmp
wcstoul
user32
AdjustWindowRect
AppendMenuW
BeginPaint
ChangeDisplaySettingsExW
ClientToScreen
ClipCursor
CopyIcon
CreateDesktopW
CreateIcon
CreatePopupMenu
CreateWindowExW
DefWindowProcW
DestroyIcon
DestroyMenu
DestroyWindow
DispatchMessageW
DrawCaptionTempW
DrawFrameControl
DrawIconEx
DrawTextW
EndPaint
EnumDisplayDevicesW
EnumDisplaySettingsExW
ExitWindowsEx
GetAncestor
GetClientRect
GetDC
GetDesktopWindow
GetForegroundWindow
GetMenuInfo
GetMenuItemCount
GetMenuItemInfoW
GetMessageW
GetProcessWindowStation
GetSystemMetrics
GetThreadDesktop
GetUserObjectInformationW
GetWindow
GetWindowLongPtrW
GetWindowLongW
GetWindowRect
GetWindowThreadProcessId
InsertMenuItemW
IntersectRect
InvalidateRect
IsIconic
IsWindowEnabled
IsWindowVisible
KillTimer
LoadCursorA
LoadCursorW
LoadIconW
LoadStringW
MessageBoxW
PaintDesktop
PostMessageW
PostQuitMessage
RegisterClassExW
RegisterClassW
ReleaseDC
SendMessageW
SendNotifyMessageW
SetCursor
SetForegroundWindow
SetMenuInfo
SetMenuItemInfoW
SetParent
SetThreadDesktop
SetTimer
SetWindowLongPtrW
SetWindowLongW
SetWindowPos
SetWindowTextW
ShowWindow
SubtractRect
SystemParametersInfoW
TrackPopupMenuEx
TranslateMessage
UnregisterClassW
UpdateLayeredWindow
UpdateWindow
win32u
NtUserMessageCall
Sections
.text Size: 76KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 768B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 1KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE