Static task
static1
Behavioral task
behavioral1
Sample
0da9becd4c6f6af2eb648a057cefb53d17cb2f468503a77d49d5e5f63d16d30c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0da9becd4c6f6af2eb648a057cefb53d17cb2f468503a77d49d5e5f63d16d30c.exe
Resource
win10v2004-20230220-en
General
-
Target
720ba891c5886cb081acb101fd7692d6.bin
-
Size
278KB
-
MD5
16d17e0f87dff21f6a9f1bb5cc21e10c
-
SHA1
197373a974edcb041d14922f5be0aff49e5c8ddb
-
SHA256
00228feef2a2caf4f1ad7162e5d535ac082160b0ac56cb195bc45fe716aa5b6e
-
SHA512
6b041b35c1ccff7c3df42c0fd91b25de8bb054f3674158f09211024505f6ea2aa3e702e71b5c20e9fa6c62d113502efecf41e52b6044e905203b42c161cda532
-
SSDEEP
6144:BANvazcsXsunqnWU8cJ75Gr40gk7/90IJUA6fkfYjlp7TBV4RIjS1DQ7fT0wBCs:q4ceq78cJ1e40xGmjY/dVx7owv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/0da9becd4c6f6af2eb648a057cefb53d17cb2f468503a77d49d5e5f63d16d30c.exe
Files
-
720ba891c5886cb081acb101fd7692d6.bin.zip
Password: infected
-
0da9becd4c6f6af2eb648a057cefb53d17cb2f468503a77d49d5e5f63d16d30c.exe.exe windows x86
Password: infected
fe4f4910437a07ca9243d1b2d5dcbc9d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeW
GetNumberOfConsoleInputEvents
GetConsoleAliasExesLengthA
InterlockedIncrement
SystemTimeToFileTime
EnumCalendarInfoW
SetDefaultCommConfigW
GetProfileSectionA
SetComputerNameW
CallNamedPipeW
MoveFileWithProgressA
GetTickCount
ReadConsoleW
SetCommState
GetDriveTypeA
SetHandleCount
GetVolumePathNameW
GetPrivateProfileIntA
LoadLibraryW
IsProcessInJob
FreeConsole
InterlockedPopEntrySList
GetFileAttributesW
CreateFileW
GetOverlappedResult
CompareStringW
GetStringTypeExA
EnumSystemLocalesA
GetProfileIntA
ReleaseActCtx
GetStdHandle
GetCurrentDirectoryW
GetProcAddress
BeginUpdateResourceW
SetFirmwareEnvironmentVariableW
RemoveDirectoryA
VerLanguageNameW
SearchPathA
PrepareTape
GetTempFileNameA
LoadLibraryA
WriteConsoleA
UnhandledExceptionFilter
LocalAlloc
BuildCommDCBAndTimeoutsW
FindFirstVolumeMountPointW
AddAtomA
GlobalWire
GetModuleFileNameA
EnumDateFormatsA
GetModuleHandleA
SetLocaleInfoW
lstrcatW
FreeEnvironmentStringsW
FindNextFileW
GetConsoleTitleW
SetCalendarInfoA
SetThreadAffinityMask
SetFileShortNameA
GetVolumeNameForVolumeMountPointW
DeleteFileW
DebugBreak
GlobalReAlloc
EnumSystemLocalesW
AreFileApisANSI
InterlockedDecrement
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
MoveFileA
HeapFree
HeapAlloc
DeleteFileA
GetModuleHandleW
ExitProcess
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
HeapCreate
WriteFile
GetModuleFileNameW
HeapSize
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
CloseHandle
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
GetEnvironmentStringsW
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
IsValidLocale
GetStringTypeW
HeapReAlloc
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
WriteConsoleW
Sections
.text Size: 109KB - Virtual size: 109KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 201KB - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.yagoveh Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 87KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ