Static task
static1
Behavioral task
behavioral1
Sample
f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe
Resource
win10v2004-20241007-en
General
-
Target
f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe
-
Size
1.5MB
-
MD5
ba2f58e1802427899637d66434431200
-
SHA1
2a3bebec53223c71b347b2c6ff20d5480d76b04c
-
SHA256
f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02
-
SHA512
add0662b77553cd95e2a9ee3b41fa260c235c4fc78ac521b446bf61d2d9be6bf20f09353051a93e519fb164a4cf51e2baf41d1c7a2aba3fad65aad0807a815b7
-
SSDEEP
24576:JK2+JY8ZAh73dfJ4yL/tNCJPXUQrPHrrEH7E:JK2D8ZAtdfJ4klKXn/Z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe
Files
-
f6e825a12a060164340d6b5c4066ef97eeacadb7ca1856dc9f44446f7e02ef02N.exe.exe windows:5 windows x86 arch:x86
b04c3bf7455af50f8f3bb617e2474340
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileW
GlobalFree
SetFilePointerEx
MoveFileExW
VerSetConditionMask
SystemTimeToFileTime
CreateProcessW
VerifyVersionInfoW
GetSystemTime
CopyFileExW
QueryPerformanceCounter
MulDiv
CompareStringW
MultiByteToWideChar
GlobalMemoryStatusEx
WriteConsoleW
DecodePointer
GetConsoleMode
GetConsoleCP
FlushFileBuffers
HeapReAlloc
HeapSize
GetStringTypeW
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetFileType
LCMapStringW
HeapFree
HeapAlloc
GetStdHandle
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
EncodePointer
SetLastError
RaiseException
RtlUnwind
TerminateProcess
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
ResetEvent
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
GetFileAttributesW
LocalAlloc
FindClose
ExpandEnvironmentStringsW
GetCurrentProcess
GetLongPathNameW
FindNextFileW
CreateDirectoryW
SetDllDirectoryW
FreeLibrary
GetModuleHandleW
GetCurrentProcessId
LocalFree
GetProcAddress
LoadLibraryW
GetCurrentThread
CloseHandle
WaitForSingleObjectEx
TerminateThread
SetEvent
GetLastError
VirtualQuery
CreateEventW
ResumeThread
ReleaseMutex
GetPrivateProfileSectionNamesW
CreateFileW
GetLocaleInfoW
GetPrivateProfileSectionW
CreateMutexW
GetModuleFileNameW
WriteFile
GetCommandLineW
GetCPInfo
WritePrivateProfileStringW
user32
IsWindowVisible
MonitorFromRect
MonitorFromWindow
EnumChildWindows
GetSysColorBrush
PostQuitMessage
CheckDlgButton
KillTimer
CheckMenuItem
TrackPopupMenuEx
SetCursor
LoadCursorW
TranslateMessage
TranslateAcceleratorW
DrawTextExW
DestroyMenu
GetWindowTextW
EnableWindow
IsDlgButtonChecked
RegisterHotKey
DestroyAcceleratorTable
GetDlgCtrlID
GetMonitorInfoW
SwitchToThisWindow
CreateIconIndirect
DestroyIcon
IsDialogMessageW
SetTimer
DispatchMessageW
LoadAcceleratorsW
GetMenu
PostMessageW
LoadMenuW
GetMessageW
UnregisterHotKey
EndPaint
BeginPaint
ReleaseDC
DialogBoxParamW
RegisterWindowMessageW
GetParent
GetWindowModuleFileNameW
EnableMenuItem
AppendMenuW
GetDlgItem
IsZoomed
GetClientRect
SetWindowLongW
ShowWindow
DrawMenuBar
GetClassNameW
SetPropW
GetMenuStringW
EnumWindows
GetSysColor
SendDlgItemMessageW
MapWindowPoints
SetDlgItemTextW
SetMenuItemInfoW
GetDlgItemTextW
MessageBoxIndirectW
IsWindowEnabled
CharLowerBuffW
SystemParametersInfoW
SetForegroundWindow
LoadImageW
InvalidateRect
IsIconic
GetCursorPos
GetWindowLongW
GetWindowThreadProcessId
CreateDialogParamW
CallWindowProcW
CheckMenuRadioItem
GetWindowRect
DestroyWindow
GetDC
SetWindowPos
GetPropW
DeleteMenu
SendMessageW
EndDialog
GetSystemMetrics
SetWindowTextW
LoadStringW
GetSubMenu
IsWindow
gdi32
BitBlt
SelectObject
CreateDIBSection
CreateCompatibleDC
GetStockObject
DeleteDC
SetBkMode
GetDeviceCaps
SetPixel
ExtTextOutW
SetBkColor
RoundRect
CreateFontIndirectW
CreateBitmap
CreateSolidBrush
SetTextColor
DeleteObject
comdlg32
ChooseColorW
ChooseFontW
advapi32
RegSetValueExW
GetTokenInformation
RegCloseKey
LookupPrivilegeValueW
SetSecurityDescriptorDacl
AdjustTokenPrivileges
AccessCheck
SetSecurityDescriptorOwner
AllocateAndInitializeSid
IsValidSecurityDescriptor
OpenProcessToken
FreeSid
InitializeSecurityDescriptor
InitializeAcl
DuplicateToken
ConvertSidToStringSidW
GetLengthSid
AddAccessAllowedAce
OpenThreadToken
LookupAccountNameW
RegQueryValueExW
RegDeleteValueW
RegOpenKeyExW
SetSecurityDescriptorGroup
shell32
CommandLineToArgvW
ShellExecuteW
Shell_NotifyIconW
ShellExecuteExW
ole32
CoInitializeEx
CoInitializeSecurity
CoCreateInstance
CoUninitialize
CoInitialize
oleaut32
SysFreeString
SysAllocString
VariantClear
comctl32
InitCommonControlsEx
shlwapi
PathRemoveFileSpecW
ord191
PathUnquoteSpacesW
PathFindFileNameW
PathGetDriveNumberW
StrFormatByteSizeW
PathSearchAndQualifyW
ord354
uxtheme
EnableThemeDialogTexture
SetThemeAppProperties
IsThemeActive
SetWindowTheme
winhttp
WinHttpCrackUrl
WinHttpCloseHandle
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpOpen
WinHttpReadData
WinHttpOpenRequest
WinHttpSetOption
WinHttpGetIEProxyConfigForCurrentUser
WinHttpSendRequest
WinHttpConnect
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationW
ntdll
NtQuerySystemInformation
NtSetSystemInformation
Sections
.text Size: 159KB - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.2MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE