Static task
static1
Behavioral task
behavioral1
Sample
29fc28e7fe1f87451e12b9a12800c80c56a3e88d0934ba5090d7e585b32fac30.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
29fc28e7fe1f87451e12b9a12800c80c56a3e88d0934ba5090d7e585b32fac30.exe
Resource
win10v2004-20230220-en
General
-
Target
c064d51ec078dea29120a759e6ae010d.bin
-
Size
241KB
-
MD5
3ffa0eec3936a375693ac44cfdcb1660
-
SHA1
d7a7585c9a51413d9698bd978d2bb0b0c91e9480
-
SHA256
25c501522f71bf90d8ce8247a1ab515534cec28ea96ba3eb5b1bb0f323c39064
-
SHA512
3ba79e1c7ef2eb537c8c5cdc7ba794e6ba4af8f9851ecf15bf50dd43c1dde87dc53a3dc108e3c294eca835b81541131932dfa25c5036830ce521554a11f9b846
-
SSDEEP
6144:7ngZyWzZbYEjWZAOX3SjVwgGH5gAhi8wI1rwF2O4ZMnKAb:7ngZnzZ2ADJQ5gAwHI1rwF2DZ6Db
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/29fc28e7fe1f87451e12b9a12800c80c56a3e88d0934ba5090d7e585b32fac30.exe
Files
-
c064d51ec078dea29120a759e6ae010d.bin.zip
Password: infected
-
29fc28e7fe1f87451e12b9a12800c80c56a3e88d0934ba5090d7e585b32fac30.exe.exe windows x86
Password: infected
dcc3403437adbaa710d120d49b019308
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumCalendarInfoA
GetDriveTypeW
GlobalCompact
InterlockedIncrement
InterlockedDecrement
HeapFree
InterlockedCompareExchange
SetComputerNameW
OpenSemaphoreA
FreeEnvironmentStringsA
GetProcessPriorityBoost
GetTickCount
GetSystemTimeAsFileTime
EnumTimeFormatsA
GetVolumePathNameW
GlobalAlloc
GetPrivateProfileIntA
LoadLibraryW
GetConsoleAliasExesLengthW
InitAtomTable
WriteConsoleW
GetModuleFileNameW
lstrcatA
MultiByteToWideChar
GetStringTypeExA
SearchPathW
DeleteFiber
GetLastError
GetCurrentDirectoryW
GetProcAddress
CreateJobSet
RemoveDirectoryA
GetLocalTime
WriteConsoleA
InterlockedExchangeAdd
SetCalendarInfoW
FindFirstVolumeMountPointW
SetFileApisToANSI
AddAtomA
CreateIoCompletionPort
GetModuleHandleA
FreeEnvironmentStringsW
FindNextFileW
VirtualProtect
CompareStringA
FileTimeToLocalFileTime
DeleteFileW
MoveFileWithProgressW
GetFileInformationByHandle
EnumSystemLocalesW
GetProfileIntA
GetVolumeNameForVolumeMountPointA
CreateFileW
CloseHandle
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
MoveFileA
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
HeapAlloc
WideCharToMultiByte
LCMapStringW
GetCPInfo
HeapCreate
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
GetModuleHandleW
ExitProcess
WriteFile
GetModuleFileNameA
GetEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
QueryPerformanceCounter
GetCurrentProcessId
GetLocaleInfoW
IsProcessorFeaturePresent
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
HeapReAlloc
SetFilePointer
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetStdHandle
DeleteFileA
gdi32
GetCharABCWidthsA
winhttp
WinHttpGetProxyForUrl
Sections
.text Size: 85KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 223KB - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ