Static task
static1
Behavioral task
behavioral1
Sample
d6876c1d11934371817b32de3e58658a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6876c1d11934371817b32de3e58658a.exe
Resource
win10v2004-20241007-en
General
-
Target
d6876c1d11934371817b32de3e58658a.exe
-
Size
425KB
-
MD5
d6876c1d11934371817b32de3e58658a
-
SHA1
a110a5cc60231af5b2d2d5f21b4495cc12f62d7a
-
SHA256
33a3b4ffccd48d3a4a02e9dda891120106adf539497101505e911d95a8eb1123
-
SHA512
342e565036017a277362fba144a5bca33c21bad1f0bba8019d8621068f42c4f4c5ec2e2834e92711f2a77801457d4e80fc28deb09932e29624ea8f0382f4afbe
-
SSDEEP
6144:LGNB8yw+7SEg3mrdDYDFm/u1GdLPkCfw6eTy:qNB/w+VgW5DYRmWgzk02
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d6876c1d11934371817b32de3e58658a.exe
Files
-
d6876c1d11934371817b32de3e58658a.exe.exe windows:5 windows x86 arch:x86
9eefacf83d553309fed787be341d76f9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumCalendarInfoW
InterlockedDecrement
GetCurrentProcess
GetLogicalDriveStringsW
SetEnvironmentVariableW
SetVolumeMountPointW
GetTimeFormatA
GetTickCount
CreateNamedPipeW
LocalFlags
GetNumberFormatA
ClearCommBreak
GetConsoleAliasExesW
GetEnvironmentStrings
LoadLibraryW
GetLocaleInfoW
_hread
GetCalendarInfoW
SetVolumeMountPointA
GetVersionExW
EnumSystemCodePagesA
CreateSemaphoreA
GetFileAttributesW
GetModuleFileNameW
CreateActCtxA
GetShortPathNameA
CreateJobObjectA
VerifyVersionInfoW
InterlockedExchange
InterlockedIncrement
GetLastError
GetCurrentDirectoryW
GetProcAddress
CopyFileA
SetComputerNameA
SetFileAttributesA
DefineDosDeviceA
GlobalFree
FindClose
LoadLibraryA
LocalAlloc
CreateHardLinkW
GetNumberFormatW
OpenEventA
FoldStringW
SetEnvironmentVariableA
GlobalWire
GetModuleFileNameA
EnumDateFormatsA
GetShortPathNameW
SetFileShortNameA
GetDiskFreeSpaceExA
ReadConsoleInputW
DebugBreak
GetTempPathA
TlsFree
LCMapStringW
CreateProcessW
CommConfigDialogA
EnumCalendarInfoA
SetFilePointer
GetStdHandle
GetComputerNameA
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
CloseHandle
FlushFileBuffers
MultiByteToWideChar
HeapFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapReAlloc
HeapAlloc
GetStartupInfoW
RaiseException
RtlUnwind
TerminateProcess
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
SetLastError
GetCurrentThreadId
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
Sleep
HeapSize
ExitProcess
WriteFile
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
WideCharToMultiByte
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
InitializeCriticalSectionAndSpinCount
SetStdHandle
GetModuleHandleA
GetConsoleCP
GetConsoleMode
gdi32
CreateDCW
GetCharWidth32A
GetCharWidthI
advapi32
ReadEventLogW
ole32
CoSuspendClassObjects
winhttp
WinHttpOpen
WinHttpSetDefaultProxyConfiguration
msimg32
AlphaBlend
Sections
.text Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xusej Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ruwaf Size: 512B - Virtual size: 214B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 96KB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ