Static task
static1
Behavioral task
behavioral1
Sample
6622b3119c7f0e8c1228b18773cd76721c77a3fd7d871c8943974a034652b8a0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6622b3119c7f0e8c1228b18773cd76721c77a3fd7d871c8943974a034652b8a0.exe
Resource
win10v2004-20241007-en
General
-
Target
6622b3119c7f0e8c1228b18773cd76721c77a3fd7d871c8943974a034652b8a0.exe
-
Size
238KB
-
MD5
e6047ee3e2b7715bf8aa2ed7be60c9d7
-
SHA1
8754c4ec41c424aca4e8e4d4f0dc69e0b6b08808
-
SHA256
6622b3119c7f0e8c1228b18773cd76721c77a3fd7d871c8943974a034652b8a0
-
SHA512
31458e228c2d778ad9eaf14fc7debec7bd00db22941d2fd5f29fa73b5f2f076210fd45db2fccd43851f0ce9ca02b77328047470dbd5258343f5e6f31211e965f
-
SSDEEP
6144:mwDpmSK310WEb9GBW73mIX/MIos0Vdh1aQ:moppM10WSKY2IQVdz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 6622b3119c7f0e8c1228b18773cd76721c77a3fd7d871c8943974a034652b8a0.exe
Files
-
6622b3119c7f0e8c1228b18773cd76721c77a3fd7d871c8943974a034652b8a0.exe.exe windows:5 windows x86 arch:x86
5107e1e1d9cfa977f2674eeaca10490f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FillConsoleOutputCharacterA
SearchPathW
GetConsoleAliasesLengthW
GetNumaProcessorNode
DebugActiveProcessStop
GetDefaultCommConfigW
CallNamedPipeA
WriteConsoleOutputW
HeapAlloc
InterlockedDecrement
GlobalSize
GetEnvironmentStringsW
CreateDirectoryW
GetComputerNameW
GetSystemDefaultLCID
GetModuleHandleW
GetCommandLineA
GetSystemTimes
GlobalAlloc
LoadLibraryW
GetConsoleAliasExesLengthW
SetConsoleMode
GetFileAttributesW
GetBinaryTypeW
GetStartupInfoW
SetConsoleTitleA
GetShortPathNameA
InterlockedExchange
GetLastError
GetProcAddress
CopyFileA
SetStdHandle
EnterCriticalSection
BuildCommDCBW
GetNumaHighestNodeNumber
OpenWaitableTimerA
LoadLibraryA
UnhandledExceptionFilter
WritePrivateProfileStringA
QueryDosDeviceW
VirtualLock
FoldStringW
GetModuleFileNameA
FreeEnvironmentStringsW
SetCalendarInfoA
FindAtomW
CopyFileExA
SetFilePointer
WriteConsoleW
EncodePointer
DecodePointer
MultiByteToWideChar
ExitProcess
GetCommandLineW
HeapSetInformation
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
LeaveCriticalSection
Sleep
HeapSize
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapFree
RtlUnwind
HeapReAlloc
WideCharToMultiByte
LCMapStringW
GetStringTypeW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
IsProcessorFeaturePresent
ReadFile
CloseHandle
CreateFileW
user32
GetUserObjectInformationW
Sections
.text Size: 102KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ