Static task
static1
Behavioral task
behavioral1
Sample
cf964698579bc9ea5e862771b92db9abc95ea18d94d6005c5dbc564336e927db.exe
Resource
win7-20230220-en
General
-
Target
b9ea2378bd6a7df88f38b6743cdceb5b.bin
-
Size
258KB
-
MD5
fbebe969a5a3cd64a618672af5fb292d
-
SHA1
9ea93f0a5865115275f5eed9badecf1920d724f5
-
SHA256
f08187322507681361b6497491b0a5169b1cb325bcbf4ef100d774d333834887
-
SHA512
205cd7cd86b89c20886401901fe66536e89b160a92f6cef4fc743febea112cf08121d6ba2eca3d9fc9df95d6c3a39478ef9ea0b0a1c4de577374f4e158d638d7
-
SSDEEP
6144:y1K9rLcSw0n4bJzo2X2ImSHf4ol+tH+mQN0m/5:9hQS4bJzo2mImAgole+F0m
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/cf964698579bc9ea5e862771b92db9abc95ea18d94d6005c5dbc564336e927db.exe
Files
-
b9ea2378bd6a7df88f38b6743cdceb5b.bin.zip
Password: infected
-
cf964698579bc9ea5e862771b92db9abc95ea18d94d6005c5dbc564336e927db.exe.exe windows x86
Password: infected
f4492804ef800c5af0eb5787c534d586
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualQuery
GetCommState
ReadConsoleA
InterlockedDecrement
CreateJobObjectW
InterlockedCompareExchange
AddConsoleAliasW
GetProcessPriorityBoost
GetConsoleAliasesLengthA
GetConsoleTitleA
GetWindowsDirectoryA
InitializeCriticalSection
GlobalAlloc
IsValidLocale
GetLocaleInfoW
FatalAppExitW
IsBadCodePtr
GetSystemWindowsDirectoryA
GetVersionExW
GlobalFlags
FindNextVolumeW
GetConsoleAliasW
ReplaceFileW
IsDBCSLeadByte
CreateActCtxA
GetTempPathW
GetStringTypeExA
AllocConsole
GetStdHandle
GetLogicalDriveStringsA
OpenMutexW
GetLastError
BindIoCompletionCallback
GetProcAddress
AttachConsole
VirtualAlloc
GetTempFileNameA
LoadLibraryA
DnsHostnameToComputerNameA
CreateFileMappingW
VirtualLock
GetTapeParameters
GetModuleFileNameA
GetDefaultCommConfigA
FindFirstVolumeMountPointA
GetModuleHandleA
HeapSetInformation
GetConsoleTitleW
WaitForDebugEvent
_lopen
FindAtomW
AddConsoleAliasA
ReadConsoleOutputCharacterW
EnumCalendarInfoExA
lstrlenA
GetDateFormatW
SetThreadContext
WideCharToMultiByte
InterlockedIncrement
InterlockedExchange
MultiByteToWideChar
Sleep
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
GetCPInfo
RtlUnwind
RaiseException
LCMapStringW
LCMapStringA
GetStringTypeW
HeapAlloc
HeapCreate
VirtualFree
HeapReAlloc
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
ExitProcess
WriteFile
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeA
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
InitializeCriticalSectionAndSpinCount
user32
CharLowerBuffW
gdi32
GetCharWidthW
GetCharABCWidthsFloatW
EnumFontsA
Sections
.text Size: 269KB - Virtual size: 268KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ