Static task
static1
Behavioral task
behavioral1
Sample
83a7f9488aa65bdf7d74aac8ce9ce3468725a40a26bc2c560758473403f99616.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
83a7f9488aa65bdf7d74aac8ce9ce3468725a40a26bc2c560758473403f99616.exe
Resource
win10v2004-20230220-en
General
-
Target
a00e64fb477f056d15dcbceb861f8439.bin
-
Size
1.7MB
-
MD5
91e3c005e0152bcfbc4c494b876af342
-
SHA1
0b470b1b72443b5f2b266331d1adbe337b77f875
-
SHA256
ba9b0894621501b03c0d8f8dec4dabc051ce910b1b3e2af7f749e07c81963cae
-
SHA512
4b48b8266b7305f197a66a2ff9bfef8259f7478ec7af29b0fa0aa084c821f48d11d80127d7e95174d9389632963de0069e130ee1874819a91d9dc9546083991c
-
SSDEEP
49152:9C9btxIq+BqNmIB+QjEc4dzdr6a2NGvweGQroY8:IBxIqzmA+oEfdzdr6ZG3GAt8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/83a7f9488aa65bdf7d74aac8ce9ce3468725a40a26bc2c560758473403f99616.exe
Files
-
a00e64fb477f056d15dcbceb861f8439.bin.zip
Password: infected
-
83a7f9488aa65bdf7d74aac8ce9ce3468725a40a26bc2c560758473403f99616.exe.exe windows x86
Password: infected
adea280a24d68b20b25b1777d23326e7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObject
InterlockedCompareExchange
AddConsoleAliasW
GetFileAttributesExA
GetModuleHandleW
GetConsoleAliasesA
IsBadReadPtr
GetNumberFormatA
FindResourceExA
GlobalAlloc
AddRefActCtx
GetCalendarInfoW
FreeConsole
CreateEventA
FindNextVolumeW
IsProcessorFeaturePresent
ReplaceFileW
GetModuleFileNameW
GetStringTypeExA
DeactivateActCtx
GetStdHandle
GetLogicalDriveStringsA
GetConsoleAliasesLengthW
GetLastError
GetCurrentDirectoryW
GetProcAddress
AttachConsole
VirtualAlloc
CreateTimerQueueTimer
VirtualAllocEx
LoadLibraryA
InterlockedExchangeAdd
WritePrivateProfileStringA
FindFirstVolumeMountPointW
GetCurrentConsoleFont
GetModuleFileNameA
lstrcmpiW
GetModuleHandleA
GetCommTimeouts
GetConsoleCursorInfo
GetCurrentThreadId
GetVersionExA
FindAtomW
DebugBreak
ReadConsoleOutputCharacterW
OpenFileMappingA
WritePrivateProfileStructA
CreateMutexW
OpenMutexW
GetDateFormatW
HeapFree
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
Sleep
ExitProcess
WriteFile
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
user32
CharLowerBuffA
gdi32
GetBkMode
GetCharABCWidthsFloatA
GetCharWidthW
Sections
.text Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ