Static task
static1
Behavioral task
behavioral1
Sample
0fbeaa3d0492f83c2351aa8f91c429f063700d1fee4aa355e439c0862f6bb41f.exe
Resource
win7-20230220-en
General
-
Target
b44b3fd2f45d55238c7e11df70148a9f.bin
-
Size
136KB
-
MD5
a7d9fd9e6ac97beaffe5a9203654a40a
-
SHA1
1b1961f5870c2d70813f192863c5d03bcd7aa677
-
SHA256
212dbf4cf103a4027f4577b7b3f1a8e13c0a25782a71d4154c120ec4b0e2fc3b
-
SHA512
b4455608bcdd33d999c9fad79535c0c814d9919c385bb25cb9c4fdd03bec8d67588752f176e38fa23bab5760c2b4adc35ebe66c67e8260d1d2c34dc17cc6b436
-
SSDEEP
3072:1/moNpby65fkOoIJAf52IPA6DCB//HR7OYyu3OHKxChdVL0:hNJsOoIWf5Glyqsf0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/0fbeaa3d0492f83c2351aa8f91c429f063700d1fee4aa355e439c0862f6bb41f.exe
Files
-
b44b3fd2f45d55238c7e11df70148a9f.bin.zip
Password: infected
-
0fbeaa3d0492f83c2351aa8f91c429f063700d1fee4aa355e439c0862f6bb41f.exe.exe windows x64
Password: infected
b5bfd9f5c740d22e228bf934c6651a65
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
RegOpenKeyExW
RegEnumKeyW
RegCloseKey
RegQueryValueExW
RegSetValueExW
kernel32
Sleep
SetEvent
GetDriveTypeW
FormatMessageW
GetWindowsDirectoryW
CreateThread
GetDiskFreeSpaceW
GetVolumeInformationW
FreeLibrary
LoadLibraryExW
GetProcessHeap
HeapFree
lstrlenW
GetTickCount
CheckElevationEnabled
GetModuleFileNameW
GetLastError
LocalFree
HeapSetInformation
CreateEventW
CloseHandle
WaitForSingleObject
GetDiskFreeSpaceExW
GetCommandLineW
SetErrorMode
GetStartupInfoA
GetModuleHandleW
MulDiv
WideCharToMultiByte
LocalAlloc
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
SetUnhandledExceptionFilter
HeapAlloc
GetVolumeNameForVolumeMountPointW
gdi32
GetLayout
ExtTextOutW
SetBkMode
SetTextColor
SetBkColor
GetTextExtentPoint32W
user32
MessageBoxW
ShowWindow
SetFocus
SendMessageW
GetDlgItem
EndDialog
DialogBoxParamW
DestroyWindow
CreateDialogParamW
IsDialogMessageW
LoadStringW
LoadIconW
GetWindowLongPtrW
EnableWindow
GetWindowLongW
GetSystemMetrics
SetWindowLongPtrW
GetClientRect
SetDlgItemTextW
EnumWindows
DispatchMessageW
TranslateMessage
PeekMessageW
GetSysColor
SetForegroundWindow
GetWindowTextW
DrawFocusRect
DestroyIcon
DrawIconEx
GetParent
PostMessageW
SendDlgItemMessageW
msvcrt
__set_app_type
_fmode
_commode
?terminate@@YAXXZ
memset
__setusermatherr
_amsg_exit
_initterm
exit
_cexit
_exit
_XcptFilter
__C_specific_handler
__getmainargs
_vsnwprintf
toupper
_wcsicmp
ntdll
NtOpenProcessToken
NtClose
NtOpenThreadToken
RtlNtStatusToDosError
WinSqmAddToStream
NtQueryInformationToken
ole32
CoTaskMemAlloc
CoInitialize
CoUninitialize
CLSIDFromString
CoTaskMemFree
CoCreateInstance
CoInitializeEx
shlwapi
StrStrIW
StrToIntW
StrCmpW
StrCmpNW
PathStripToRootW
ord271
StrFormatByteSizeW
ord487
SHDeleteKeyW
shell32
ShellExecuteExW
SHGetFileInfoW
ExtractIconExW
ord680
vssapi
CreateVssBackupComponentsInternal
VssFreeSnapshotPropertiesInternal
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 792B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 175KB - Virtual size: 176KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 204B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ