Static task
static1
Behavioral task
behavioral1
Sample
873b21d35de73579c414bcc2fec942cd54e2f4b475841d13586973ce7a916e12.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
873b21d35de73579c414bcc2fec942cd54e2f4b475841d13586973ce7a916e12.exe
Resource
win10v2004-20230220-en
General
-
Target
f9551afd93c262e990a4278f067a9318.bin
-
Size
17KB
-
MD5
92a44c7322e884e5aec20de5cf9cf163
-
SHA1
6df4efa982ea93651e601c11e696e660edcc429a
-
SHA256
b038021a84985bf851b74a1da603baac86c757f1d29d6d4064e2f77c11459bdd
-
SHA512
3a3070070a7170ab042c84c1199be50e9d5147ddb11954c8c8d4e9bd2c30d03a6f5372b4b7a7c694ea5d43a26b2be59c57cd7b447c611ae6a061e4a39488ba26
-
SSDEEP
192:3Ke5ejgmPstZAXtwmftCdDEwee0UE9zHxOUszPBRaTAhhliCWP7sGNtNgRw8eWnt:3zcgyYyO50PYVhYTP/gRGWKbXwE6bV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/873b21d35de73579c414bcc2fec942cd54e2f4b475841d13586973ce7a916e12.exe
Files
-
f9551afd93c262e990a4278f067a9318.bin.zip
Password: infected
-
873b21d35de73579c414bcc2fec942cd54e2f4b475841d13586973ce7a916e12.exe.exe windows x86
Password: infected
f7839f01539029f2b3d6f540e5326dce
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
ReleaseMutex
WinExec
SetSystemTime
GetSystemTime
WaitForSingleObject
CreateMutexA
GetCommandLineA
LCMapStringA
SetEndOfFile
ReadFile
GetStringTypeW
GetStringTypeA
SetFilePointer
ExitProcess
TerminateProcess
GetCurrentProcess
GetModuleHandleA
GetStartupInfoA
GetVersion
HeapFree
GetLastError
CloseHandle
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
WriteFile
HeapAlloc
VirtualAlloc
HeapReAlloc
SetStdHandle
FlushFileBuffers
MultiByteToWideChar
CreateFileA
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
LCMapStringW
user32
FindWindowExA
MessageBoxA
SetFocus
keybd_event
GetDesktopWindow
Sections
.text Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ