Static task
static1
Behavioral task
behavioral1
Sample
e4ff3d138daf42cc71613a0b2b9131e672ab42e3fc8f12779efa2f882985c40c.exe
Resource
win7-20230220-en
General
-
Target
75d17a65aaa036ca964b513f82d7d2ec.bin
-
Size
177KB
-
MD5
510f436116a93ce55e7c30c411bf2b37
-
SHA1
c82235ce96e9c94240e97481080749de7cb1e7a9
-
SHA256
06db848ed15ba7229269ffc30daaff902e4d15314908c520f48b0ba9e345c945
-
SHA512
a288d03a5275ce37c56ee7beb55083ba949956a96a374232ed235cc025fac18c03565a2f5a4ab5dae48f5638bc28ea105fcbe3691821e80ba1b34abb086f7375
-
SSDEEP
3072:1QIdht1z58ZSlQ1OEAjZaJTS1+vYFixJkXYmKrUJlq4xpl1mtYNV/B6xI9w:1Z8SlAWUJTS1+AFOkX+UPxpl1mipaR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/e4ff3d138daf42cc71613a0b2b9131e672ab42e3fc8f12779efa2f882985c40c.exe
Files
-
75d17a65aaa036ca964b513f82d7d2ec.bin.zip
Password: infected
-
e4ff3d138daf42cc71613a0b2b9131e672ab42e3fc8f12779efa2f882985c40c.exe.exe windows x86
Password: infected
2be08f59009c044eb260e71538d506db
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualQuery
GetDefaultCommConfigW
GetCommState
GetConsoleAliasA
InterlockedDecrement
GetLogicalDriveStringsW
CreateJobObjectW
InterlockedCompareExchange
AddConsoleAliasW
WaitForSingleObjectEx
GetProcessPriorityBoost
GetTickCount
GetConsoleAliasesLengthA
GetConsoleTitleA
GetWindowsDirectoryA
CancelDeviceWakeupRequest
WriteFile
CreateActCtxW
InitializeCriticalSection
GlobalAlloc
GetLocaleInfoW
FatalAppExitW
GetSystemWindowsDirectoryA
GetVersionExW
GetStringTypeExW
GlobalFlags
FindNextVolumeW
AllocConsole
ReplaceFileW
IsDBCSLeadByte
GetModuleFileNameW
GetStdHandle
OpenMutexW
GetLastError
ReadConsoleOutputCharacterA
GetProcAddress
AttachConsole
VirtualAlloc
GetTempFileNameA
LoadLibraryA
DnsHostnameToComputerNameA
CreateFileMappingW
IsSystemResumeAutomatic
GetTapeParameters
FindFirstVolumeMountPointA
GetModuleHandleA
GetConsoleTitleW
WaitForDebugEvent
SetProcessShutdownParameters
_lopen
FindAtomW
AddConsoleAliasA
PeekNamedPipe
SetThreadContext
lstrlenA
MulDiv
WideCharToMultiByte
InterlockedIncrement
InterlockedExchange
MultiByteToWideChar
Sleep
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
GetCPInfo
RtlUnwind
RaiseException
LCMapStringW
LCMapStringA
GetStringTypeW
HeapAlloc
HeapCreate
VirtualFree
HeapReAlloc
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeA
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
InitializeCriticalSectionAndSpinCount
user32
CharLowerBuffW
gdi32
GetCharWidthW
GetCharABCWidthsFloatW
EnumFontsA
Sections
.text Size: 190KB - Virtual size: 190KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ