Static task
static1
Behavioral task
behavioral1
Sample
3cb44a87566ee76eabd616840ed7d0f5ca8c7ec4d0f40f17642935e60af7074e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3cb44a87566ee76eabd616840ed7d0f5ca8c7ec4d0f40f17642935e60af7074e.exe
Resource
win10v2004-20230220-en
General
-
Target
071ab9c97d4ecaf86433f17c6b5dba3f.bin
-
Size
340KB
-
MD5
f7e5dae252e90d879d39331e5535cf6d
-
SHA1
9289cedbf4f8f7e01bab6bfe9daa48bda5a46aa6
-
SHA256
d9784bd98e734fe5dd475522d6a741de3f676773b941a009fe4e5ab383b4ba6b
-
SHA512
e51c5002266de61f407d4af1120308a740baf0d9d999e6c8515e74dc1dd0f18ecf271dff721d88bbaa9a11b7dfc91aba9dfc43bda9dcc0546f6d00d972484e1b
-
SSDEEP
6144:h+KZkTqRPVgu3QgLzhlaulnnn1a2Spk9OwDpeEDpKX:f3llTxn15IX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/3cb44a87566ee76eabd616840ed7d0f5ca8c7ec4d0f40f17642935e60af7074e.exe
Files
-
071ab9c97d4ecaf86433f17c6b5dba3f.bin.zip
Password: infected
-
3cb44a87566ee76eabd616840ed7d0f5ca8c7ec4d0f40f17642935e60af7074e.exe.exe windows x86
Password: infected
065892c10ab6d2b7cb3bb70f065537fa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileW
CreateFileW
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
HeapDestroy
VirtualAlloc
VirtualProtect
Sleep
FreeConsole
DecodePointer
EncodePointer
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
WriteConsoleW
HeapQueryInformation
HeapSize
HeapReAlloc
HeapFree
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
InterlockedPushEntrySList
InterlockedFlushSList
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetStdHandle
WriteFile
GetModuleFileNameW
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
GetCommandLineA
GetCommandLineW
GetACP
HeapAlloc
HeapValidate
GetSystemInfo
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
GetCurrentThread
OutputDebugStringA
OutputDebugStringW
CloseHandle
WaitForSingleObjectEx
CreateThread
FindClose
FindFirstFileExA
FindFirstFileExW
FindNextFileA
FindNextFileW
IsValidCodePage
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetEnvironmentVariableW
SetStdHandle
GetStringTypeW
GetProcessHeap
SetConsoleCtrlHandler
RaiseException
user32
MessageBoxA
SetCursor
LoadCursorW
SendMessageW
SetWindowPos
GetWindowRect
GetDlgItem
GetClassNameW
MapWindowPoints
DestroyWindow
Sections
.text Size: 572KB - Virtual size: 571KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 136KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 521KB - Virtual size: 526KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 1024B - Virtual size: 990B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.00cfg Size: 512B - Virtual size: 260B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 158KB - Virtual size: 157KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ