Static task
static1
Behavioral task
behavioral1
Sample
7634559c1f31d02170001101a08597f37d49f99dbb6a9846739b8c50d12d6553.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
7634559c1f31d02170001101a08597f37d49f99dbb6a9846739b8c50d12d6553.exe
Resource
win10v2004-20230220-en
General
-
Target
2ae795a2cfb22a87bebd713bef1ae78d.bin
-
Size
105KB
-
MD5
889a030bf0e5d3a4e0aaf7756725e7c4
-
SHA1
5dce53f11c2d24cff488fb7b0d83b95e17e7965d
-
SHA256
970f64e5e28592e21520e7951a74090525b58b184ad925b24e58f255a9eb9384
-
SHA512
6aa640c23fa2211c66452de5760494f073261559a8b80c2b675f46d748ff9edbf0fa152a2673f67de640cbe2d615cbc781c59b6e2d4b851bb29b527dce904248
-
SSDEEP
1536:uOmAbwLbUcD/kqIV8Cd3z3q7uQWRShek/qcShQqoChwnPsHQvdy4CWFh:ujAbwscYnd354heIqrvRhwkNIh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/7634559c1f31d02170001101a08597f37d49f99dbb6a9846739b8c50d12d6553.exe
Files
-
2ae795a2cfb22a87bebd713bef1ae78d.bin.zip
Password: infected
-
7634559c1f31d02170001101a08597f37d49f99dbb6a9846739b8c50d12d6553.exe.exe windows x86
Password: infected
7c79a6c939917f4d3e5e71240b362de3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
GetLastError
CreateThread
GetModuleFileNameA
ExitThread
LeaveCriticalSection
EnterCriticalSection
GetTickCount
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetLocalTime
GetSystemDirectoryA
GetWindowsDirectoryA
DeleteFileA
CloseHandle
ReadFile
SetFilePointer
CreateFileA
QueryPerformanceCounter
QueryPerformanceFrequency
ExitProcess
CreateProcessA
WriteFile
FindClose
FindNextFileA
FindFirstFileA
LoadLibraryA
GetProcAddress
GetModuleHandleA
FormatMessageA
GlobalUnlock
GlobalLock
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
SetFileTime
GetFileTime
ExpandEnvironmentStringsA
SetFileAttributesA
GetFileAttributesA
GetTempPathA
MultiByteToWideChar
WideCharToMultiByte
GetComputerNameA
CopyFileA
CreateDirectoryA
GetCurrentProcess
TerminateProcess
lstrcmpiA
OpenProcess
GetExitCodeProcess
PeekNamedPipe
DuplicateHandle
CreatePipe
GetLocaleInfoA
GetVersionExA
GetLogicalDrives
TerminateThread
GlobalMemoryStatus
GetTimeFormatA
GetDateFormatA
MoveFileA
GetCurrentProcessId
WaitForSingleObject
CreateMutexA
TransactNamedPipe
SetEndOfFile
InterlockedExchange
GetCurrentThreadId
IsBadCodePtr
IsBadReadPtr
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
VirtualQuery
GetSystemInfo
VirtualProtect
HeapSize
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
SetUnhandledExceptionFilter
HeapFree
HeapReAlloc
HeapAlloc
GetSystemTimeAsFileTime
RtlUnwind
RaiseException
GetStartupInfoA
GetCommandLineA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
GetACP
GetOEMCP
GetCPInfo
LCMapStringA
LCMapStringW
user32
GetClassNameA
EnumChildWindows
EnumWindows
SendMessageA
ws2_32
__WSAFDIsSet
accept
recv
send
WSAStartup
select
inet_addr
htons
connect
closesocket
WSACleanup
listen
bind
ioctlsocket
setsockopt
socket
Sections
.text Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 347KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE