Static task
static1
Behavioral task
behavioral1
Sample
2f463640ede2ba652be4fbadf180af9b992917a4100e702c518405ac9ebe3aa6.exe
Resource
win7-20230220-en
General
-
Target
ad81ad210fb20edef734aac8c79626fa.bin
-
Size
147KB
-
MD5
ad81ad210fb20edef734aac8c79626fa
-
SHA1
84864adffbb9ac58763ee97371ae85495364b50a
-
SHA256
f4c30fb1655b8e4159ef6d32028da1ca06267f71abb9528da526e5adcacdf25f
-
SHA512
846bd41d34c1e4a01ebfe6b646978402ea5e202676018f2b8a9dc842a3875e3badf7407946333cf2a93160cf5c8e8607ed5e411263d9f2a2c95d654563976d54
-
SSDEEP
3072:8UE6x3AEpyMU40cHoC3hT2S8HlwucNWumPsy610Tq94LRfhO3N7HN:l/pyMNRhapX+h94LPO3N7HN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/2f463640ede2ba652be4fbadf180af9b992917a4100e702c518405ac9ebe3aa6.exe
Files
-
ad81ad210fb20edef734aac8c79626fa.bin.zip
Password: infected
-
2f463640ede2ba652be4fbadf180af9b992917a4100e702c518405ac9ebe3aa6.exe.exe windows x64
77e359c59376704055cd15c273e85720
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
RegCreateKeyExW
RegCloseKey
RegSetValueExW
RegQueryValueExW
RegDeleteValueW
RegOpenKeyExW
RegNotifyChangeKeyValue
RegFlushKey
kernel32
EnterCriticalSection
DeleteCriticalSection
GetCommandLineW
lstrlenA
FreeLibrary
WaitForSingleObject
SetEvent
RegisterApplicationRestart
LoadLibraryW
Sleep
CreateEventW
WaitForMultipleObjects
HeapSetInformation
GetCurrentThreadId
CloseHandle
GetVersionExW
GetProcAddress
GetSystemInfo
GetFullPathNameW
WideCharToMultiByte
ReadFile
GetProcessHeap
SetEndOfFile
GetCurrentDirectoryW
VirtualQuery
SetThreadStackGuarantee
VirtualAlloc
VirtualProtect
FlushFileBuffers
SetStdHandle
CreateFileW
GetConsoleMode
GetConsoleCP
SetFilePointer
GetStringTypeW
MultiByteToWideChar
LCMapStringW
LoadLibraryExW
InitializeCriticalSectionAndSpinCount
HeapSize
GetOEMCP
GetACP
GetCPInfo
OutputDebugStringA
RtlCaptureContext
RtlVirtualUnwind
lstrlenW
GetModuleFileNameW
GetFileAttributesW
LeaveCriticalSection
GetSystemDirectoryW
InitializeCriticalSection
WriteConsoleW
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
HeapCreate
FlsAlloc
GetCommandLineA
GetStartupInfoW
GetLastError
HeapFree
HeapReAlloc
ExitThread
FlsSetValue
FlsGetValue
CreateThread
RaiseException
RtlPcToFileHeader
RtlLookupFunctionEntry
RtlUnwindEx
HeapAlloc
SetUnhandledExceptionFilter
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
EncodePointer
DecodePointer
FlsFree
SetLastError
user32
UpdateWindow
SetWindowTextW
DispatchMessageW
EnableWindow
DestroyWindow
SetTimer
GetWindowRect
PostQuitMessage
PostMessageW
KillTimer
MsgWaitForMultipleObjects
GetKeyState
SetForegroundWindow
GetFocus
DialogBoxParamW
CallNextHookEx
IsWindowEnabled
GetWindowLongPtrW
GetClientRect
SetFocus
TranslateMessage
IsDialogMessageW
LoadIconW
GetWindowLongW
PeekMessageW
GetDlgItem
EndDialog
GetDesktopWindow
SetWindowPos
LoadStringW
CheckDlgButton
ShowWindow
CreateDialogParamW
SetWindowsHookExW
AdjustWindowRectEx
UnhookWindowsHookEx
MessageBoxW
SendMessageW
comdlg32
GetSaveFileNameW
shell32
ShellExecuteW
ole32
CoUninitialize
CoInitialize
CoInitializeSecurity
CoCreateInstance
Sections
.text Size: 288KB - Virtual size: 287KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ