Static task
static1
Behavioral task
behavioral1
Sample
6c6345c6f0a5beadc4616170c87ec8a577de185d53345581e1b00e72af24c13e.exe
Resource
win7-20230220-en
General
-
Target
a14d01d96ea78f39f7e118582dad3cb9.bin
-
Size
147KB
-
MD5
7c7260614c6a497d992daf94e51a7518
-
SHA1
291d9d256ea0a17392d9996b907e03090c4689c7
-
SHA256
01edf08bddfe8f6fe0a30ecbc2554092c859e72ec31cf84abfa1096f1e9b819c
-
SHA512
f1eb8f4f2f75d9afd70500925b84963a4bb266ce4c1c3185201d08c4ab2a8f897a9e8423c7bc2b4df2727ca2e9456398c1c4f42af7a3aa5fcb06951286ece13d
-
SSDEEP
3072:NXTry6IT/ArVoAX0TzEsoAIn50sPml4hwYJdlzfnJrlQt:N6hioAEfEslk1At
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/6c6345c6f0a5beadc4616170c87ec8a577de185d53345581e1b00e72af24c13e.exe
Files
-
a14d01d96ea78f39f7e118582dad3cb9.bin.zip
Password: infected
-
6c6345c6f0a5beadc4616170c87ec8a577de185d53345581e1b00e72af24c13e.exe.exe windows x64
Password: infected
77e359c59376704055cd15c273e85720
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
RegCreateKeyExW
RegCloseKey
RegSetValueExW
RegQueryValueExW
RegDeleteValueW
RegOpenKeyExW
RegNotifyChangeKeyValue
RegFlushKey
kernel32
EnterCriticalSection
DeleteCriticalSection
GetCommandLineW
lstrlenA
FreeLibrary
WaitForSingleObject
SetEvent
RegisterApplicationRestart
LoadLibraryW
Sleep
CreateEventW
WaitForMultipleObjects
HeapSetInformation
GetCurrentThreadId
CloseHandle
GetVersionExW
GetProcAddress
GetSystemInfo
GetFullPathNameW
WideCharToMultiByte
ReadFile
GetProcessHeap
SetEndOfFile
GetCurrentDirectoryW
VirtualQuery
SetThreadStackGuarantee
VirtualAlloc
VirtualProtect
FlushFileBuffers
SetStdHandle
CreateFileW
GetConsoleMode
GetConsoleCP
SetFilePointer
GetStringTypeW
MultiByteToWideChar
LCMapStringW
LoadLibraryExW
InitializeCriticalSectionAndSpinCount
HeapSize
GetOEMCP
GetACP
GetCPInfo
OutputDebugStringA
RtlCaptureContext
RtlVirtualUnwind
lstrlenW
GetModuleFileNameW
GetFileAttributesW
LeaveCriticalSection
GetSystemDirectoryW
InitializeCriticalSection
WriteConsoleW
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
HeapCreate
FlsAlloc
GetCommandLineA
GetStartupInfoW
GetLastError
HeapFree
HeapReAlloc
ExitThread
FlsSetValue
FlsGetValue
CreateThread
RaiseException
RtlPcToFileHeader
RtlLookupFunctionEntry
RtlUnwindEx
HeapAlloc
SetUnhandledExceptionFilter
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
EncodePointer
DecodePointer
FlsFree
SetLastError
user32
UpdateWindow
SetWindowTextW
DispatchMessageW
EnableWindow
DestroyWindow
SetTimer
GetWindowRect
PostQuitMessage
PostMessageW
KillTimer
MsgWaitForMultipleObjects
GetKeyState
SetForegroundWindow
GetFocus
DialogBoxParamW
CallNextHookEx
IsWindowEnabled
GetWindowLongPtrW
GetClientRect
SetFocus
TranslateMessage
IsDialogMessageW
LoadIconW
GetWindowLongW
PeekMessageW
GetDlgItem
EndDialog
GetDesktopWindow
SetWindowPos
LoadStringW
CheckDlgButton
ShowWindow
CreateDialogParamW
SetWindowsHookExW
AdjustWindowRectEx
UnhookWindowsHookEx
MessageBoxW
SendMessageW
comdlg32
GetSaveFileNameW
shell32
ShellExecuteW
ole32
CoUninitialize
CoInitialize
CoInitializeSecurity
CoCreateInstance
Sections
.text Size: 288KB - Virtual size: 287KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ