Static task
static1
Behavioral task
behavioral1
Sample
815ba5daa0c90ec895ffba288b21bdf1.zip
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
815ba5daa0c90ec895ffba288b21bdf1.zip
Resource
win10v2004-20230221-en
Behavioral task
behavioral3
Sample
aeacfdb02517c802c36489a0246cbadc2ba4af154aeed81c577ccfce88a0f7f9.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
aeacfdb02517c802c36489a0246cbadc2ba4af154aeed81c577ccfce88a0f7f9.exe
Resource
win10v2004-20230220-en
General
-
Target
815ba5daa0c90ec895ffba288b21bdf1.bin
-
Size
6.1MB
-
MD5
766695d11f900fe688a0974dabf5b9c0
-
SHA1
379cdc86424c03d49823dffa637b52b1cd96c341
-
SHA256
fbcec29d94585e9e509e575802ec8b37dbbf450bf2d2dd300b1b3770ecce0d54
-
SHA512
88c6b543ca97144ec3aefe33781841d90d29f8c87700e511b7899a75f9cf93dba8765e7dc356aab86dc98a8ed8a22d74b9f378aaf7e786ac6c5c91a4accb8c34
-
SSDEEP
196608:2AdmDBxYctj6KBemHC1p6HWQIQkr6qzI7Wv:2AduxYyImHzWQgDzI7w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/aeacfdb02517c802c36489a0246cbadc2ba4af154aeed81c577ccfce88a0f7f9.exe
Files
-
815ba5daa0c90ec895ffba288b21bdf1.bin.zip .ps1
Password: infected
-
aeacfdb02517c802c36489a0246cbadc2ba4af154aeed81c577ccfce88a0f7f9.exe.exe windows x86
Password: infected
3c2483074ed7bb50fc3617987ea220e9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
GetProcessHeap
IsDebuggerPresent
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
GetProcAddress
GetModuleHandleW
GetStartupInfoW
TlsSetValue
TlsAlloc
ExitProcess
Sleep
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
RtlUnwind
RaiseException
GetCPInfo
HeapReAlloc
HeapFree
GetLastError
MultiByteToWideChar
LeaveCriticalSection
EnterCriticalSection
DecodePointer
EncodePointer
AreFileApisANSI
GetStdHandle
GetModuleFileNameW
WriteFile
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStringsW
IsValidCodePage
GetACP
GetConsoleMode
ReadFile
SetFilePointerEx
LoadLibraryExW
OutputDebugStringW
ReadConsoleW
CreateFileW
SetEndOfFile
SetLastError
GetCommandLineW
GetOverlappedResult
TerminateProcess
WriteConsoleW
Beep
InitializeCriticalSectionAndSpinCount
FormatMessageA
GetModuleHandleExW
MapViewOfFile
DeleteCriticalSection
GetFileType
CreateFileMappingA
TlsGetValue
CreateThread
WaitForSingleObjectEx
HeapSize
GetLocaleInfoA
GetModuleFileNameA
UnhandledExceptionFilter
SetCommState
GetWindowsDirectoryA
WaitNamedPipeA
GlobalMemoryStatus
GetSystemDefaultLangID
LCMapStringW
TlsFree
GetThreadTimes
GetCurrentProcessId
CloseHandle
GetStringTypeW
FreeEnvironmentStringsW
GetModuleHandleA
GetOEMCP
FindClose
SetStdHandle
IsDBCSLeadByteEx
SetCurrentDirectoryA
FlushFileBuffers
GetSystemDirectoryA
CreateProcessA
WideCharToMultiByte
GlobalAlloc
GetConsoleCP
WaitForSingleObject
HeapAlloc
GetDateFormatW
GetCurrentProcess
user32
MapDialogRect
MessageBeep
GetClientRect
GetKeyboardState
GetWindowTextA
GetScrollInfo
DrawStateW
EnableScrollBar
GetWindowRect
DestroyIcon
SetDlgItemTextA
SetWindowPlacement
LoadIconA
CreateAcceleratorTableW
UpdateWindow
LoadCursorA
SetCursor
DialogBoxParamA
SetScrollInfo
CheckMenuItem
ShowOwnedPopups
EndPaint
DestroyWindow
InflateRect
ReleaseDC
SetMenu
DispatchMessageA
DestroyMenu
FindWindowA
SetTimer
DeleteMenu
SetFocus
GetDC
ShowCursor
GetKeyboardLayout
InvalidateRect
SetScrollPos
DefWindowProcA
RedrawWindow
FindWindowExW
CheckRadioButton
SystemParametersInfoA
SetWindowTextA
ToUnicode
DestroyAcceleratorTable
TrackPopupMenu
IsIconic
ChangeDisplaySettingsW
SendMessageA
ShowCaret
RegisterWindowMessageA
BeginPaint
SetScrollRange
CreateIconIndirect
WinHelpA
GetQueueStatus
BringWindowToTop
GetWindowLongA
PeekMessageW
PeekMessageA
EnableMenuItem
ScrollWindow
SetWindowsHookExA
DestroyCursor
GetSysColor
ShowWindow
CreateCaret
InsertMenuA
AdjustWindowRect
GetDlgItemTextA
GetCaretBlinkTime
TranslateMDISysAccel
RegisterClassA
gdi32
GetDIBits
CreateBitmap
PolyPolyline
GetSystemPaletteEntries
CreateICW
StretchBlt
CreateFontIndirectA
CopyEnhMetaFileA
GetWinMetaFileBits
GetRgnBox
CreatePalette
GetRegionData
SetMapMode
GetNearestPaletteIndex
CreateRectRgn
GetTextExtentPointA
GetObjectA
TranslateCharsetInfo
Pie
GetCharacterPlacementW
GetDeviceCaps
SetBkColor
GdiFlush
CreateHalftonePalette
SelectClipRgn
SaveDC
GetObjectType
GetTextExtentPointW
SelectPalette
SetPaletteEntries
GetTextExtentExPointA
SetStretchBltMode
CreatePen
GetClipBox
SetROP2
RoundRect
GetPixel
GetStockObject
GetDIBColorTable
GetCharWidthA
CreateCompatibleDC
SetPixel
ExcludeClipRect
CreateFontA
Polygon
GetBkMode
SetTextColor
SetWindowExtEx
DeleteDC
SetMetaFileBitsEx
PatBlt
GetBitmapBits
GetBrushOrgEx
CreateEnhMetaFileW
RectVisible
GetEnhMetaFileHeader
IntersectClipRect
CreatePatternBrush
advapi32
RegOpenKeyA
SetSecurityDescriptorOwner
AllocateAndInitializeSid
RegDeleteValueA
RegCreateKeyExA
SetSecurityDescriptorDacl
RegDeleteKeyA
CopySid
shell32
CommandLineToArgvW
Sections
.text Size: 909KB - Virtual size: 908KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5.8MB - Virtual size: 8.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ