@dfkvodv@0
Static task
static1
Behavioral task
behavioral1
Sample
6c7f3c761c1b5ad6e8dcc0bc1253cfb87aef214260b5244b4f86e7ed682951a6.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
6c7f3c761c1b5ad6e8dcc0bc1253cfb87aef214260b5244b4f86e7ed682951a6.exe
Resource
win10v2004-20241007-en
General
-
Target
6c7f3c761c1b5ad6e8dcc0bc1253cfb87aef214260b5244b4f86e7ed682951a6
-
Size
13.4MB
-
MD5
a43bf1a91d2d7d2c0350593078a95fe5
-
SHA1
685f6b436510395fee228855f2b3842266e0710c
-
SHA256
6c7f3c761c1b5ad6e8dcc0bc1253cfb87aef214260b5244b4f86e7ed682951a6
-
SHA512
43ae85a0230abc37a7909d512e93cfcf09c19602c9bc1064bec988cf08ee8f8b159a47daff55af3804cd335356a1c43a04e951875029a936215cfb95adb0cf9b
-
SSDEEP
1536:h0wSS5v4kCdJwumQA1tdc+2ogPM90svCW3jpNUB5X2CEjrpf9IwqdNdBgotfYn58:hSSePdJwhhy690sKqpyB8xpGwUptf6e
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6c7f3c761c1b5ad6e8dcc0bc1253cfb87aef214260b5244b4f86e7ed682951a6
Files
-
6c7f3c761c1b5ad6e8dcc0bc1253cfb87aef214260b5244b4f86e7ed682951a6.exe windows:5 windows x86 arch:x86
3b19b547c46dd755c27c3b4a53a1014a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFullPathNameW
HeapReAlloc
SetupComm
IsBadStringPtrW
lstrlenA
EnumDateFormatsExW
SetConsoleTextAttribute
ReadConsoleA
GetSystemWindowsDirectoryW
SetThreadExecutionState
FindFirstFileExW
GetTickCount
GetPriorityClass
SizeofResource
DeleteVolumeMountPointW
EnumSystemCodePagesA
FindNextVolumeW
IsDBCSLeadByte
GetEnvironmentVariableA
MultiByteToWideChar
lstrlenW
DisconnectNamedPipe
SetVolumeLabelW
GetPrivateProfileStringA
GetAtomNameA
LoadLibraryA
GetProcessWorkingSetSize
LocalAlloc
IsWow64Process
BuildCommDCBAndTimeoutsW
GetExitCodeThread
WTSGetActiveConsoleSessionId
VirtualProtect
PurgeComm
CompareStringA
WriteConsoleOutputAttribute
GetCurrentProcessId
lstrcpyW
GetCommandLineW
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
EncodePointer
DecodePointer
RtlUnwind
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
GetLastError
SetFilePointer
HeapFree
CloseHandle
GetProcAddress
GetModuleHandleW
ExitProcess
WriteFile
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
QueryPerformanceCounter
GetSystemTimeAsFileTime
Sleep
CreateFileA
SetStdHandle
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LoadLibraryW
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapAlloc
SetEndOfFile
GetProcessHeap
ReadFile
IsProcessorFeaturePresent
WriteConsoleW
HeapSize
LCMapStringW
GetStringTypeW
CreateFileW
winhttp
WinHttpCloseHandle
Exports
Exports
Sections
.text Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.poji Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rotag Size: 512B - Virtual size: 346B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13.2MB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ