Static task
static1
Behavioral task
behavioral1
Sample
31c679761cde0dde6ca8218c6a3c372897800a3cbe5d4e6917b57c429c8010d3.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
31c679761cde0dde6ca8218c6a3c372897800a3cbe5d4e6917b57c429c8010d3.exe
Resource
win10v2004-20230221-en
General
-
Target
02797f7558acb033fe4752db0cebe906.bin
-
Size
166KB
-
MD5
9668af992a1390fa96961d51242dadf1
-
SHA1
d5d9d6448f50b5d61979d96d957b71a6806e0506
-
SHA256
6351403f95371afbef36df394c76fb05a3bcb69c3b3e0e2af9dd0a8506fd031f
-
SHA512
9a065083bc7baeb81b7b4bb63d465c3d460ae07deb3d8f2a3b193df6351e2e9310c053fc3de28c6b32243119afe9c6349919a8e0fe96e92dd55e531e32332882
-
SSDEEP
3072:Gx5sW/o3kNUG+s5YvM+y7/+3MnehrGxylRAwhnlWkoPdighXMdI2pXfXoMsKi1:Gx5Y3qyA8y7+3uehSx+Rptl5oFigCuaO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/31c679761cde0dde6ca8218c6a3c372897800a3cbe5d4e6917b57c429c8010d3.exe
Files
-
02797f7558acb033fe4752db0cebe906.bin.zip
Password: infected
-
31c679761cde0dde6ca8218c6a3c372897800a3cbe5d4e6917b57c429c8010d3.exe.exe windows x86
Password: infected
5d1142e6b5dd917186b13ffa418932e3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLocaleInfoA
GetDriveTypeW
GetNumberOfConsoleInputEvents
GetConsoleAliasExesLengthA
InterlockedIncrement
SystemTimeToFileTime
EnumCalendarInfoW
SetDefaultCommConfigW
GetProfileSectionA
SetComputerNameW
CallNamedPipeW
MoveFileWithProgressA
GetTickCount
ReadConsoleW
SetCommState
GetDriveTypeA
SetHandleCount
GetVolumePathNameW
GetPrivateProfileIntA
LoadLibraryW
IsProcessInJob
FreeConsole
InterlockedPopEntrySList
GetFileAttributesA
CreateFileW
GetOverlappedResult
CompareStringW
GetStringTypeExA
EnumSystemLocalesA
GetProfileIntA
ReleaseActCtx
GetStdHandle
GetCurrentDirectoryW
GetProcAddress
BeginUpdateResourceW
SetFirmwareEnvironmentVariableW
RemoveDirectoryA
VerLanguageNameW
SearchPathA
PrepareTape
GetTempFileNameA
LoadLibraryA
WriteConsoleA
UnhandledExceptionFilter
LocalAlloc
BuildCommDCBAndTimeoutsW
FindFirstVolumeMountPointW
AddAtomW
AddAtomA
GlobalWire
GetModuleFileNameA
FindNextFileA
EnumDateFormatsA
GetModuleHandleA
lstrcatW
FreeEnvironmentStringsW
GetConsoleTitleW
SetCalendarInfoA
SetThreadAffinityMask
SetFileShortNameA
GetVolumeNameForVolumeMountPointW
DeleteFileW
DebugBreak
GlobalReAlloc
EnumSystemLocalesW
AreFileApisANSI
InterlockedDecrement
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
MoveFileA
HeapFree
HeapAlloc
DeleteFileA
GetModuleHandleW
ExitProcess
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
HeapCreate
WriteFile
GetModuleFileNameW
HeapSize
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
CloseHandle
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
GetEnvironmentStringsW
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
IsValidLocale
GetStringTypeW
HeapReAlloc
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
WriteConsoleW
Sections
.text Size: 109KB - Virtual size: 109KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 88KB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.jusiy Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 86KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ