Behavioral task
behavioral1
Sample
$$_unpacked.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
$$_unpacked.exe
Resource
win10v2004-20221111-en
General
-
Target
$$_unpacked.tmp.zip
-
Size
635KB
-
MD5
f22ac6af0036e03b96065ebaafaed43d
-
SHA1
5f30cebc9305960d387aa28eb785101eb5ef57d5
-
SHA256
7640f83c3ede85839a8ae1ad167910c09b1ef86203ce43412944c95c9a0e39c6
-
SHA512
ae2a77cd06ae0da4fabe1b38ca53f8278360790295fa5923c9599e627479dd54b2c6027b8fbe653161781fbb8b82700ae143309a40a21de76b759101335859bd
-
SSDEEP
12288:F55i+JEufnAruR37B28P6UFeq3l2mutZlrabJsKFv2IijkYK67G:xiVuwuRLHyUFhVxut3sKIOIiQYxG
Malware Config
Signatures
-
resource yara_rule static1/unpack001/$$_unpacked.tmp aspack_v212_v242 -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule static1/unpack001/$$_unpacked.tmp autoit_exe
Files
-
$$_unpacked.tmp.zip.zip
Password: infected
-
$$_unpacked.tmp.exe windows x86
Password: infected
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 568KB - Virtual size: 568KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 192KB - Virtual size: 192KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 244KB - Virtual size: 244KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Yaron Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE