Static task
static1
Behavioral task
behavioral1
Sample
ec621d8d37fd8e0032228b3d756f2dc557f22b9b7e9fa02d3c53106d63644748.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ec621d8d37fd8e0032228b3d756f2dc557f22b9b7e9fa02d3c53106d63644748.exe
Resource
win10v2004-20230220-en
General
-
Target
2a944dce9abc515386c432501b20145b.bin
-
Size
249KB
-
MD5
3e7b86752f1eb09a6eb57cbef32cad44
-
SHA1
79d19dea1a7d0626819f161554f02b27e58f096f
-
SHA256
7e027244b341d5c631752657075657a9bcf96709fcbc1ef156fab87703d17ad5
-
SHA512
5cdc378ade67b8fe2e82cc55981d1ac69ec377312a6a62eab612c0f1279d973eac34a2d7a2fd26d0f3ad0d697ee89742e8627bef7f461a4157ad647626399851
-
SSDEEP
6144:h0fhupx8wI8MkjoMsMWNpPolOMbjJ9RXxEWaodoII8BP9fceaGDHwULMjW:dz8Tc0pPolOMhnBYIIw9iGDn3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/ec621d8d37fd8e0032228b3d756f2dc557f22b9b7e9fa02d3c53106d63644748.exe
Files
-
2a944dce9abc515386c432501b20145b.bin.zip
Password: infected
-
ec621d8d37fd8e0032228b3d756f2dc557f22b9b7e9fa02d3c53106d63644748.exe.exe windows x86
Password: infected
9c2a3030a4ae74d0318479a269d40369
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CharNextA
ole32
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
CoTaskMemRealloc
oleaut32
VarUI4FromStr
kernel32
CloseHandle
CreateEventW
CreateFileW
CreateThread
DecodePointer
DeleteCriticalSection
EncodePointer
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileExW
FindNextFileW
FindResourceA
FlushFileBuffers
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleCP
GetConsoleMode
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStringsW
GetFileType
GetLastError
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleExW
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemInfo
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSectionAndSpinCount
InitializeCriticalSectionEx
InitializeSListHead
IsDBCSLeadByte
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
LCMapStringW
LeaveCriticalSection
LoadLibraryExA
LoadLibraryExW
LoadResource
MultiByteToWideChar
OutputDebugStringW
QueryPerformanceCounter
RaiseException
ResetEvent
RtlUnwind
SetEvent
SetFilePointerEx
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
SizeofResource
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualProtect
VirtualQuery
WaitForSingleObjectEx
WideCharToMultiByte
WriteConsoleW
WriteFile
lstrcmpiA
advapi32
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegOpenKeyExA
RegQueryInfoKeyW
RegSetValueExA
Sections
.text Size: 105KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 303KB - Virtual size: 305KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.voltbl Size: 512B - Virtual size: 95B
.rsrc Size: 1024B - Virtual size: 608B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ