Static task
static1
Behavioral task
behavioral1
Sample
6c10c6befa2ed075af8e443d10715aadfb5c01e9161317584a5429a69bcd4e98.exe
Resource
win7-20240903-en
General
-
Target
6c10c6befa2ed075af8e443d10715aadfb5c01e9161317584a5429a69bcd4e98
-
Size
311KB
-
MD5
b0d985f94baf83124702f65dd32c9a32
-
SHA1
a0bdf12cca957ba14a96ef7b59a033ee14f98f89
-
SHA256
6c10c6befa2ed075af8e443d10715aadfb5c01e9161317584a5429a69bcd4e98
-
SHA512
0ccf5d5e2070c79396e31e991097119b2ef46e2af43e41c407b87388b3e19a4dc4fdc974953c864e654fee17e68ec30e35f36a73711eb6748b611417b2866558
-
SSDEEP
6144:KIopxVqUt3EgyNXLhcQORKft7RnXdProV0:KICVqUegyNbCU7RnXdPro
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6c10c6befa2ed075af8e443d10715aadfb5c01e9161317584a5429a69bcd4e98
Files
-
6c10c6befa2ed075af8e443d10715aadfb5c01e9161317584a5429a69bcd4e98.exe windows:5 windows x86 arch:x86
1ac9c2d30781eceefbbdf7dc71c9cada
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetNumaNodeProcessorMask
GetConsoleAliasesLengthW
CopyFileExW
GetNumaProcessorNode
WriteConsoleOutputW
InterlockedDecrement
QueryDosDeviceA
GetUserDefaultLCID
GetComputerNameW
CallNamedPipeW
FreeEnvironmentStringsA
GetModuleHandleW
GetCommandLineA
GetPriorityClass
GetEnvironmentStrings
GlobalAlloc
LoadLibraryW
GetConsoleMode
CopyFileW
GetConsoleAliasExesLengthW
HeapDestroy
GetFileAttributesA
GlobalFlags
GetBinaryTypeA
GetStartupInfoW
SetConsoleTitleA
DisconnectNamedPipe
GetShortPathNameA
GetComputerNameA
GetConsoleAliasesW
InterlockedExchange
FillConsoleOutputCharacterW
GetLastError
GetProcAddress
SetStdHandle
EnterCriticalSection
SearchPathA
LoadLibraryA
OpenWaitableTimerW
WritePrivateProfileStringA
FindAtomA
FoldStringA
GetModuleFileNameA
GetDefaultCommConfigA
ContinueDebugEvent
FreeEnvironmentStringsW
BuildCommDCBA
SetCalendarInfoA
GlobalReAlloc
SetFileAttributesW
GetVolumeInformationW
WriteConsoleW
CloseHandle
CreateDirectoryA
DebugActiveProcess
EncodePointer
DecodePointer
MultiByteToWideChar
ExitProcess
GetCommandLineW
HeapSetInformation
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
ReadFile
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
Sleep
HeapSize
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
WriteFile
GetModuleFileNameW
GetEnvironmentStringsW
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
HeapFree
RtlUnwind
HeapReAlloc
WideCharToMultiByte
LCMapStringW
GetStringTypeW
IsProcessorFeaturePresent
GetConsoleCP
FlushFileBuffers
CreateFileW
user32
GetUserObjectInformationA
advapi32
RegCreateKeyA
Sections
.text Size: 169KB - Virtual size: 168KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 35.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 123KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ