Static task
static1
Behavioral task
behavioral1
Sample
de3f27526eca92d8bab305d2942fbaf89d96b5fda6467dbf931b373868215b0b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
de3f27526eca92d8bab305d2942fbaf89d96b5fda6467dbf931b373868215b0b.exe
Resource
win10v2004-20230220-en
General
-
Target
c47f32f68a1ca3309768b48ec98cd752.bin
-
Size
171KB
-
MD5
67fce904f3593d65c04ecdf87202a0aa
-
SHA1
fad95bcfcf61ff66167a0a0fe6c0998e25d5b018
-
SHA256
a8ffadf2ab8d3c75298773b6b619a6e5cbfc9557592f2993195f82d12987f049
-
SHA512
7b8468012af6f4d4da384cac082681950692d4a2a670f375187780928eb37fe2cc4597e996f3ad87f9770a1b60c59863356e78aef64c96d7f5a8777d522d86bd
-
SSDEEP
3072:yIFYoV5M+0Uqp4rH8tgs/MITd8w0cjaMlbossnxMADYUSZ9o:yIOo7Mt3Ars/MIZ8w0cuwossSADYUSZu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/de3f27526eca92d8bab305d2942fbaf89d96b5fda6467dbf931b373868215b0b.exe
Files
-
c47f32f68a1ca3309768b48ec98cd752.bin.zip
Password: infected
-
de3f27526eca92d8bab305d2942fbaf89d96b5fda6467dbf931b373868215b0b.exe.exe windows x86
Password: infected
203b54dd7cb5052a152152d37aa392da
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObject
SetComputerNameW
AddConsoleAliasW
GetComputerNameW
GetModuleHandleW
EnumCalendarInfoExW
GetConsoleAliasesA
GetNumberFormatA
GetConsoleTitleA
ReadConsoleW
GetWindowsDirectoryA
GetConsoleAliasExesW
EnumTimeFormatsW
CreateActCtxW
SetProcessPriorityBoost
FindResourceExA
GetCalendarInfoW
GetSystemWindowsDirectoryA
FindNextVolumeW
Beep
WriteConsoleW
GetConsoleFontSize
lstrlenW
GlobalUnlock
GetShortPathNameA
GetCPInfoExW
SetLastError
GetProcAddress
GetLongPathNameA
VirtualAlloc
HeapSize
IsBadHugeWritePtr
GetConsoleAliasA
EnumSystemCodePagesW
SetThreadPriorityBoost
LoadLibraryA
InterlockedExchangeAdd
LocalAlloc
RemoveDirectoryW
QueryDosDeviceW
WriteProfileSectionW
AddAtomA
FindAtomA
EnumResourceTypesW
GetModuleFileNameA
GetOEMCP
GetDefaultCommConfigA
SetConsoleCursorInfo
GetConsoleTitleW
WriteConsoleOutputAttribute
GetDiskFreeSpaceExW
WriteFileEx
DeleteTimerQueueTimer
SuspendThread
RaiseException
GetModuleHandleA
GetLocaleInfoA
ReadConsoleA
lstrlenA
SystemTimeToFileTime
BeginUpdateResourceW
FindResourceA
MultiByteToWideChar
GetCommandLineA
GetStartupInfoA
HeapAlloc
GetLastError
HeapFree
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
Sleep
ExitProcess
GetCPInfo
GetACP
IsValidCodePage
SetUnhandledExceptionFilter
WriteFile
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
InitializeCriticalSectionAndSpinCount
RtlUnwind
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
ToAsciiEx
ChangeMenuA
CharLowerBuffW
CreateAcceleratorTableW
GetWindowLongW
GetSysColorBrush
SetCaretPos
ModifyMenuA
IsCharAlphaNumericA
GetKeyNameTextA
gdi32
CreateHalftonePalette
GetCharABCWidthsW
GetCharWidthW
advapi32
BackupEventLogA
Sections
.text Size: 143KB - Virtual size: 143KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 6.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 130KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ