Static task
static1
Behavioral task
behavioral1
Sample
19d6c86ef7a1f836a836dfe615377d427d6b32ff4898f417b6c728ec9f7b929c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
19d6c86ef7a1f836a836dfe615377d427d6b32ff4898f417b6c728ec9f7b929c.exe
Resource
win10v2004-20230220-en
General
-
Target
f97b62669db744c41246b4c2160956fa.bin
-
Size
181KB
-
MD5
49419b1c2117766a87d26cd5b106ae31
-
SHA1
a8f29d296fa28bc5ffcafc31d0ff482badbe5513
-
SHA256
7e09d46e9a577f523a06b5366a2c3644c4b443bacfc590d2ecaf12895ce50a10
-
SHA512
ae02184aa877d03a1ef72c54c42b7d41d7b7770701c32967daccaa8b8eb44b511b189582f741352adc8bfa4e5e79158d921da77a647545c5ed7da73b9ccf6d83
-
SSDEEP
3072:6YR5EVBfgBAdiDLo/hRgL43XluEXZwRDyWpkgz/YIzWGd14SCO0z6Ynl924:BRQiDL6hS4l6RJyWwWrd14SCbz6Ynls4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/19d6c86ef7a1f836a836dfe615377d427d6b32ff4898f417b6c728ec9f7b929c.exe
Files
-
f97b62669db744c41246b4c2160956fa.bin.zip
Password: infected
-
19d6c86ef7a1f836a836dfe615377d427d6b32ff4898f417b6c728ec9f7b929c.exe.exe windows x86
Password: infected
4d0a7f70eaa3e152ceda1701c7d8bbd2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CancelWaitableTimer
AddConsoleAliasW
GetModuleHandleW
EnumCalendarInfoExW
GetConsoleAliasesA
GetConsoleAliasesLengthA
ReadConsoleW
EnumTimeFormatsA
CreateActCtxW
SetProcessPriorityBoost
GetCalendarInfoA
GetSystemWindowsDirectoryA
SetConsoleCP
HeapCreate
DnsHostnameToComputerNameW
FindNextVolumeW
GetConsoleAliasW
Beep
GetModuleFileNameW
GetConsoleFontSize
lstrlenW
ReplaceFileA
GlobalUnlock
GetConsoleAliasesW
GetLastError
GetProcAddress
VirtualAlloc
BeginUpdateResourceW
SetConsoleScreenBufferSize
RemoveDirectoryA
SetComputerNameA
GetTempFileNameA
LoadLibraryA
WriteConsoleA
InterlockedExchangeAdd
LocalAlloc
IsSystemResumeAutomatic
GetNumberFormatW
QueryDosDeviceW
AddAtomA
GetDefaultCommConfigA
FindFirstVolumeMountPointA
GetModuleHandleA
GetConsoleTitleW
EnumDateFormatsW
GetConsoleCursorInfo
GetShortPathNameW
GetDiskFreeSpaceExW
FindAtomW
GetWindowsDirectoryW
DeleteTimerQueueTimer
AddConsoleAliasA
EnumSystemLocalesW
CreateFileA
CloseHandle
WriteConsoleW
GetConsoleOutputCP
SetStdHandle
WaitForSingleObject
GetProfileStringW
WriteProfileSectionA
SetProcessAffinityMask
FlushFileBuffers
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
MultiByteToWideChar
GetStartupInfoW
RaiseException
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapFree
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
VirtualFree
HeapReAlloc
ExitProcess
WriteFile
GetModuleFileNameA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
LCMapStringA
LCMapStringW
user32
GetParent
ToAsciiEx
ChangeMenuW
GetClassInfoExA
GetWindowLongA
CreateAcceleratorTableW
GetSysColorBrush
gdi32
GetCharWidthA
SetColorAdjustment
GetCharABCWidthsFloatW
winhttp
WinHttpOpen
Sections
.text Size: 166KB - Virtual size: 166KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 31.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ