Static task
static1
Behavioral task
behavioral1
Sample
e3ffa663eeaa0eeda2b5cb06d094cb847f6520df57385c5d7fe5e49d01c99c8f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e3ffa663eeaa0eeda2b5cb06d094cb847f6520df57385c5d7fe5e49d01c99c8f.exe
Resource
win10v2004-20230221-en
General
-
Target
531df55984e2b66ad9f0dbd639de601e.bin
-
Size
171KB
-
MD5
918d7f6baa453d249ac754ed94049115
-
SHA1
b4d241e964bf833bcedb0467d2c66df0014db027
-
SHA256
6ffd0a23f224b192b9528c6b13bf203638c74e45b6da2f269d82776a6ca83fc5
-
SHA512
ee95baa26e91ae186019dce349b27ac76263aeefd58f4413beefd9e6389a98846a23708b418f59662e43a2079503534b6e8cee77152218fff23fc00954c7b2ee
-
SSDEEP
3072:7Am4qRSwSayg81H1eBfVLbhb7LUxBdhs86kPfHPTXvyjZB5P0e3xevGjkEzDQwz5:FSJ7g0VeBdbh/LUxTR6knvTf8xdkiD0E
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/e3ffa663eeaa0eeda2b5cb06d094cb847f6520df57385c5d7fe5e49d01c99c8f.exe
Files
-
531df55984e2b66ad9f0dbd639de601e.bin.zip
Password: infected
-
e3ffa663eeaa0eeda2b5cb06d094cb847f6520df57385c5d7fe5e49d01c99c8f.exe.exe windows x86
203b54dd7cb5052a152152d37aa392da
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObject
SetComputerNameW
AddConsoleAliasW
GetComputerNameW
GetModuleHandleW
EnumCalendarInfoExW
GetConsoleAliasesA
GetNumberFormatA
GetConsoleTitleA
ReadConsoleW
GetWindowsDirectoryA
GetConsoleAliasExesW
EnumTimeFormatsW
CreateActCtxW
SetProcessPriorityBoost
FindResourceExA
GetCalendarInfoW
GetSystemWindowsDirectoryA
FindNextVolumeW
Beep
WriteConsoleW
GetConsoleFontSize
lstrlenW
GlobalUnlock
GetShortPathNameA
GetCPInfoExW
SetLastError
GetProcAddress
GetLongPathNameA
VirtualAlloc
HeapSize
IsBadHugeWritePtr
GetConsoleAliasA
EnumSystemCodePagesW
SetThreadPriorityBoost
LoadLibraryA
InterlockedExchangeAdd
LocalAlloc
RemoveDirectoryW
QueryDosDeviceW
WriteProfileSectionW
AddAtomA
FindAtomA
EnumResourceTypesW
GetModuleFileNameA
GetOEMCP
GetDefaultCommConfigA
SetConsoleCursorInfo
GetConsoleTitleW
WriteConsoleOutputAttribute
GetDiskFreeSpaceExW
WriteFileEx
DeleteTimerQueueTimer
SuspendThread
RaiseException
GetModuleHandleA
GetLocaleInfoA
ReadConsoleA
lstrlenA
SystemTimeToFileTime
BeginUpdateResourceW
FindResourceA
MultiByteToWideChar
GetCommandLineA
GetStartupInfoA
HeapAlloc
GetLastError
HeapFree
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
Sleep
ExitProcess
GetCPInfo
GetACP
IsValidCodePage
SetUnhandledExceptionFilter
WriteFile
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
InitializeCriticalSectionAndSpinCount
RtlUnwind
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
ToAsciiEx
ChangeMenuA
CharLowerBuffW
CreateAcceleratorTableW
GetWindowLongW
GetSysColorBrush
SetCaretPos
ModifyMenuA
IsCharAlphaNumericA
GetKeyNameTextA
gdi32
CreateHalftonePalette
GetCharABCWidthsW
GetCharWidthW
advapi32
BackupEventLogA
Sections
.text Size: 144KB - Virtual size: 143KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 6.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 130KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ