Static task
static1
Behavioral task
behavioral1
Sample
ade538af242fc9466f2569a046cfa5645caf41ea88b0b0aa17ef15a0f5aac0bf.exe
Resource
win7-20230220-en
General
-
Target
ade538af242fc9466f2569a046cfa5645caf41ea88b0b0aa17ef15a0f5aac0bf.zip
-
Size
242KB
-
MD5
1a8d31177bf7135fe3569090ba5dffc0
-
SHA1
05e95a3f90d446d2ffd609984b07d59161035b19
-
SHA256
7ce004bcc9b4e7681252c6cc2a7a1a99d444feb55061e4ab7abf3ec987227ef3
-
SHA512
7b9d3ffb0af76f8cf3c8d38a19cd1294c75cf02d93ba2f476b07ce0aba777d9e596f86f07fe50e49dd13b7407a9e70519cd9e13385ef9cf9da0e906a4b817921
-
SSDEEP
6144:eHRW5uhFB5C4r3g5OcLDZeHp0pVCnSTEgDQI7Tj7dCx:eQ5uhQ4TJcfL3jR0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/ade538af242fc9466f2569a046cfa5645caf41ea88b0b0aa17ef15a0f5aac0bf
Files
-
ade538af242fc9466f2569a046cfa5645caf41ea88b0b0aa17ef15a0f5aac0bf.zip.zip
Password: infected
-
ade538af242fc9466f2569a046cfa5645caf41ea88b0b0aa17ef15a0f5aac0bf.exe windows x86
Password: infected
bf5a4aa99e5b160f8521cadd6bfe73b8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RaiseException
GetLastError
MultiByteToWideChar
lstrlenA
InterlockedDecrement
GetProcAddress
LoadLibraryA
FreeResource
SizeofResource
LockResource
LoadResource
FindResourceA
GetModuleHandleA
Module32Next
CloseHandle
Module32First
CreateToolhelp32Snapshot
GetCurrentProcessId
SetEndOfFile
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetLocaleInfoA
HeapFree
GetProcessHeap
HeapAlloc
GetCommandLineA
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
HeapSize
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
ReadFile
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
FlushFileBuffers
SetFilePointer
SetHandleCount
GetFileType
GetStartupInfoA
RtlUnwind
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
CompareStringA
CompareStringW
SetEnvironmentVariableA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CreateFileA
ole32
OleInitialize
oleaut32
SafeArrayCreate
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayDestroy
SafeArrayCreateVector
VariantClear
VariantInit
SysFreeString
SysAllocString
Sections
.text Size: 102KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 163KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ