Static task
static1
Behavioral task
behavioral1
Sample
e54e9f7fe7725afa85dfe0d0e04cf873d01084989205d93b4b4e1e1de7d935f3.exe
Resource
win7-20230220-en
General
-
Target
1e93be0d225ce928393039c9771321fb.bin
-
Size
166KB
-
MD5
59c5fe1cb8ceafa3561723b2e51d03ff
-
SHA1
ea01fa1812f0c8e8dfd40fee98376bb102fad094
-
SHA256
e01a673cecb79f018242748a73f1e1d2987fe2064c4256b6503f248043eb5f72
-
SHA512
fd07a82be81fd08c73910b37d05f4b7a8af2858926d1a99871a920aa0fe3e582e9566f3df8a41d477f266b838f6af7150c3ccf608596909c3e4caa0cd6e3f3b7
-
SSDEEP
3072:Wv/Gr2HJX1/DpY5iSVURG3pp3Sey+CBnBdO4aja6IFedZzvVuTBZxvp44S8CrZ:WvMetdpmiSVpZpSZBdTaeDeXVuPxqT8W
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/e54e9f7fe7725afa85dfe0d0e04cf873d01084989205d93b4b4e1e1de7d935f3.exe
Files
-
1e93be0d225ce928393039c9771321fb.bin.zip
Password: infected
-
e54e9f7fe7725afa85dfe0d0e04cf873d01084989205d93b4b4e1e1de7d935f3.exe.exe windows x86
Password: infected
51ff29d4db4362644e59273b02a12d87
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFix
SetDefaultCommConfigA
GetDriveTypeW
GetConsoleAliasExesLengthA
InterlockedIncrement
SystemTimeToFileTime
EnumCalendarInfoW
GetUserDefaultLCID
MoveFileWithProgressA
GetTickCount
ReadConsoleW
TzSpecificLocalTimeToSystemTime
SetHandleCount
AllocateUserPhysicalPages
GlobalAlloc
GetPrivateProfileIntA
AddRefActCtx
SetFileShortNameW
LoadLibraryW
IsProcessInJob
GetCalendarInfoW
FreeConsole
GetFileAttributesW
CreateFileW
GetOverlappedResult
GetVolumePathNameA
GetStringTypeExA
EnumSystemLocalesA
GetProfileIntA
ReleaseActCtx
GetCurrentDirectoryW
SetLastError
GetProcAddress
VerLanguageNameA
SetComputerNameA
SearchPathA
GetTempFileNameA
LoadLibraryA
WriteConsoleA
MoveFileA
FindFirstVolumeMountPointW
RemoveDirectoryW
BeginUpdateResourceA
AddAtomA
GlobalWire
GetModuleFileNameA
GetModuleHandleA
SetLocaleInfoW
lstrcatW
FreeEnvironmentStringsW
FindNextFileW
GetConsoleTitleW
EnumDateFormatsW
CompareStringA
SetCalendarInfoA
SetThreadAffinityMask
GetVolumeNameForVolumeMountPointW
DeleteFileW
DebugBreak
GetProfileSectionW
EnumSystemLocalesW
AreFileApisANSI
InterlockedDecrement
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
HeapFree
HeapAlloc
GetModuleHandleW
ExitProcess
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
IsProcessorFeaturePresent
HeapCreate
WriteFile
GetStdHandle
GetModuleFileNameW
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
CloseHandle
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
GetEnvironmentStringsW
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
IsValidLocale
GetStringTypeW
HeapReAlloc
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
WriteConsoleW
DeleteFileA
Sections
.text Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lixa Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ