Static task
static1
Behavioral task
behavioral1
Sample
4df3c7555abcb8c377c24a2622b7b48e2f51db456ecd08f32354df1ae32b8de1.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4df3c7555abcb8c377c24a2622b7b48e2f51db456ecd08f32354df1ae32b8de1.exe
Resource
win10v2004-20230220-en
General
-
Target
4df3c7555abcb8c377c24a2622b7b48e2f51db456ecd08f32354df1ae32b8de1.zip
-
Size
171KB
-
MD5
2d7ee977de00effc50c94daf9c597531
-
SHA1
1b9a4b34f8731dcf670886bf6aa074a5390a73be
-
SHA256
63f191237aab65dabd7693530522e77f503f2651157e4100efab2b42098f0da0
-
SHA512
6cb3c390de0050c3f5b6721c35e02f1a553c803bdacf8eb5d3181b6665d7566018dc51fc0acea1b54e12fe1699d3eafacd1a232c815e14b28bedd97d16d0de73
-
SSDEEP
3072:l4iVmk+sZ+iIAovvFcUH/v5zs1L8nTfp9wYFv5mojlX37KGrpFyfbs:SiVZI3c4/v5g4T/FRRV371Fyjs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/4df3c7555abcb8c377c24a2622b7b48e2f51db456ecd08f32354df1ae32b8de1.exe
Files
-
4df3c7555abcb8c377c24a2622b7b48e2f51db456ecd08f32354df1ae32b8de1.zip.zip
Password: infected
-
4df3c7555abcb8c377c24a2622b7b48e2f51db456ecd08f32354df1ae32b8de1.exe.exe windows x86
Password: infected
541976701da86ee44f78e36955c7f1d2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVolumeNameForVolumeMountPointA
GlobalFix
CreateFileA
SetDefaultCommConfigA
SetLocaleInfoA
EnumCalendarInfoA
GetDriveTypeW
AllocConsole
InterlockedIncrement
GetProfileSectionA
GetUserDefaultLCID
GetModuleHandleW
GetTickCount
ReadConsoleW
TzSpecificLocalTimeToSystemTime
SetHandleCount
AllocateUserPhysicalPages
GlobalAlloc
GetPrivateProfileIntA
AddRefActCtx
SetFileShortNameW
LoadLibraryW
IsProcessInJob
GetCalendarInfoW
SetVolumeMountPointA
GetConsoleAliasExesLengthW
GetFileAttributesA
GetFileAttributesW
WriteConsoleW
GetModuleFileNameW
GetVolumePathNameA
GetStringTypeExA
GetProfileIntA
ReleaseActCtx
SetLastError
GetProcAddress
MoveFileW
SetComputerNameA
SearchPathA
GetTempFileNameA
LoadLibraryA
SetCalendarInfoW
FindFirstVolumeMountPointW
RemoveDirectoryW
BeginUpdateResourceA
AddAtomA
GlobalWire
FindNextFileA
CreateIoCompletionPort
lstrcatW
FreeEnvironmentStringsW
GetConsoleTitleW
GetCurrentDirectoryA
EnumDateFormatsW
CompareStringA
SetThreadAffinityMask
FileTimeToLocalFileTime
MoveFileWithProgressW
DebugBreak
EnumSystemLocalesW
AreFileApisANSI
DeleteFileA
InterlockedDecrement
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
HeapFree
ExitProcess
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
HeapAlloc
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
HeapCreate
SetFilePointer
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
HeapSize
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
GetLocaleInfoW
WriteFile
GetModuleFileNameA
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
HeapReAlloc
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
CloseHandle
CreateFileW
Sections
.text Size: 107KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 111KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ