Static task
static1
Behavioral task
behavioral1
Sample
6df70e9b0ce453d5ead006234442edc72c00d40498ce520d673aef5012b74779.exe
Resource
win7-20230220-en
General
-
Target
0b389a07b1d64368734f1c56f311bd09.bin
-
Size
169KB
-
MD5
75aed1ef402fa48dd60c6a19e7318134
-
SHA1
29075f46749016275d06b7fd9eb444177a624f3c
-
SHA256
03a768f104040cfa7a72e2b13f02653d2db16178487ba6b13dc6510aa955f120
-
SHA512
3633887a3db721916b4c0744f14d13ccba1240efaf1261ff7efff2a47d7eedfa8d07a2a18b19e95964e7b732c2e87069cacd7505d64a45774c14f43f92223dff
-
SSDEEP
3072:L5yDPvWKf9a6rm4+s4AoOrhkIVs6X9c35ojJL5fZDX/k7BtulecgTIEfy+/cEDa:L5yC09a8/oO/u6X235ap5VklCebIE6E+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/6df70e9b0ce453d5ead006234442edc72c00d40498ce520d673aef5012b74779.exe
Files
-
0b389a07b1d64368734f1c56f311bd09.bin.zip
Password: infected
-
6df70e9b0ce453d5ead006234442edc72c00d40498ce520d673aef5012b74779.exe.exe windows x86
Password: infected
03b474336f7777602be2676c530abdad
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleAliasesLengthW
FindResourceExW
GetLogicalDriveStringsW
AddConsoleAliasW
GetModuleHandleW
GetTickCount
GetCurrentThread
VirtualFree
GenerateConsoleCtrlEvent
GetConsoleAliasesA
GetNumberFormatA
GetPriorityClass
GlobalAlloc
AddRefActCtx
GetLocaleInfoW
GetCalendarInfoW
ReplaceFileW
GetModuleFileNameW
DeactivateActCtx
OpenMutexW
GetLastError
WritePrivateProfileStructA
ChangeTimerQueueTimer
lstrcmpiA
GetProcAddress
AttachConsole
VirtualAlloc
VirtualAllocEx
LoadLibraryA
InterlockedExchangeAdd
GetConsoleScreenBufferInfo
WritePrivateProfileStringA
FindFirstVolumeMountPointW
CreateEventW
GetCurrentConsoleFont
FindAtomA
WaitForMultipleObjects
GetModuleFileNameA
GetModuleHandleA
GetCommTimeouts
WaitForDebugEvent
GetVersionExA
ReadConsoleOutputCharacterW
OpenFileMappingA
FindNextVolumeA
CreateMutexW
GetCurrentDirectoryW
GetDateFormatW
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
GetCPInfo
RtlUnwind
RaiseException
LCMapStringW
LCMapStringA
GetStringTypeW
HeapAlloc
SetHandleCount
GetStdHandle
GetFileType
HeapCreate
HeapReAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapSize
ExitProcess
WriteFile
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeA
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
SetFilePointer
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
CloseHandle
CreateFileA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
SetEndOfFile
GetProcessHeap
ReadFile
user32
CharLowerBuffA
gdi32
GetCharABCWidthsFloatA
GetCharWidthA
Sections
.text Size: 182KB - Virtual size: 182KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 33.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ