Static task
static1
Behavioral task
behavioral1
Sample
9b1752c0e5f980b01e81c3c75c9b7ff998f3006f7a7eb6bd3c40f079df4b1953.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
9b1752c0e5f980b01e81c3c75c9b7ff998f3006f7a7eb6bd3c40f079df4b1953.exe
Resource
win10v2004-20230221-en
General
-
Target
eae0b33da6ca4b0f0e88d3169e20cc10.bin
-
Size
667KB
-
MD5
0a398059d10fc01b80cfbddc60684403
-
SHA1
443426c3cfd376c6b62256c40e692631b706f8c4
-
SHA256
86ca031ebf96f2a5fd7436cd8ab2b0bfd13e4c94afc2d03d82e8e520c0dded78
-
SHA512
0e04a4121ea48c3b56905ec66bbcc59507592c3843df9f7b2b28fd2f5460ded0c5769d17da089f16e4e8e17841ff9a4974274c1f1e8729fdeca8a189ac25b6ef
-
SSDEEP
12288:fanKI8szzUi9vbNf/G9BEiowr6LTfwOOui2Lav1MxsmdGqlOkXNgUyXhn:yKPssMNG6wSrL2MpE2NngB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/9b1752c0e5f980b01e81c3c75c9b7ff998f3006f7a7eb6bd3c40f079df4b1953.exe
Files
-
eae0b33da6ca4b0f0e88d3169e20cc10.bin.zip
Password: infected
-
9b1752c0e5f980b01e81c3c75c9b7ff998f3006f7a7eb6bd3c40f079df4b1953.exe.exe windows x86
Password: infected
9f1c50433c092232aec71253e6e21bd6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrencyFormatA
GetUserDefaultLangID
GetProcessTimes
FormatMessageW
ReplaceFileW
ReadFile
lstrlenW
FindNextVolumeMountPointW
IsBadStringPtrA
WritePrivateProfileStringW
GlobalUnlock
GetTempPathW
LCMapStringA
GetLastError
BuildCommDCBW
GlobalFree
LoadLibraryA
LocalAlloc
SetCommMask
GetTapeParameters
DebugSetProcessKillOnExit
SetConsoleTitleW
OpenFileMappingW
GetProcessAffinityMask
VirtualProtect
GetCurrentProcessId
UnregisterWaitEx
CreateHardLinkA
WriteTapemark
GlobalAddAtomA
SetComputerNameA
EncodePointer
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
RaiseException
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapFree
IsProcessorFeaturePresent
Sleep
HeapSize
GetProcAddress
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapReAlloc
LoadLibraryW
RtlUnwind
SetStdHandle
WriteConsoleW
MultiByteToWideChar
LCMapStringW
GetStringTypeW
CreateFileW
CloseHandle
FlushFileBuffers
advapi32
LookupAccountNameW
Sections
.text Size: 643KB - Virtual size: 642KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 60.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ