Static task
static1
Behavioral task
behavioral1
Sample
b4811cfea7143cd12cb326703c2fca08d4c19a69fb47fa82b62528a2886784fe.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b4811cfea7143cd12cb326703c2fca08d4c19a69fb47fa82b62528a2886784fe.exe
Resource
win10v2004-20230220-en
General
-
Target
649e0b806f36c6e6ae49e8eab68cc49c.bin
-
Size
247KB
-
MD5
bd842784a41528205dbd2fbbd4625901
-
SHA1
9443fdf09c1673deb3afb78e190abb52e686b9f9
-
SHA256
d7ddf17f8d80453dd808726555d3833e3e74414532b9487e51ce5afdf78866eb
-
SHA512
f3739b253a893e1996b82bf53592ba7b3ac6a3892dca26fc911ee6075df8e61e62581083157af217b8311303a86f128421c42d71feb4156f1a89277c87d19221
-
SSDEEP
6144:8QUHRS6LmV82L0QblZO8Uqpat2Bi7ENLFisk26ZRSHo:gxS6LmV82IkaupiAVLkjSHo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/b4811cfea7143cd12cb326703c2fca08d4c19a69fb47fa82b62528a2886784fe.exe
Files
-
649e0b806f36c6e6ae49e8eab68cc49c.bin.zip
Password: infected
-
b4811cfea7143cd12cb326703c2fca08d4c19a69fb47fa82b62528a2886784fe.exe.exe windows x86
Password: infected
03b474336f7777602be2676c530abdad
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleAliasesLengthW
FindResourceExW
GetLogicalDriveStringsW
AddConsoleAliasW
GetModuleHandleW
GetTickCount
GetCurrentThread
VirtualFree
GenerateConsoleCtrlEvent
GetConsoleAliasesA
GetNumberFormatA
GetPriorityClass
GlobalAlloc
AddRefActCtx
GetLocaleInfoW
GetCalendarInfoW
ReplaceFileW
GetModuleFileNameW
DeactivateActCtx
OpenMutexW
GetLastError
WritePrivateProfileStructA
ChangeTimerQueueTimer
lstrcmpiA
GetProcAddress
AttachConsole
VirtualAlloc
VirtualAllocEx
LoadLibraryA
InterlockedExchangeAdd
GetConsoleScreenBufferInfo
WritePrivateProfileStringA
FindFirstVolumeMountPointW
CreateEventW
GetCurrentConsoleFont
FindAtomA
WaitForMultipleObjects
GetModuleFileNameA
GetModuleHandleA
GetCommTimeouts
WaitForDebugEvent
GetVersionExA
ReadConsoleOutputCharacterW
OpenFileMappingA
FindNextVolumeA
CreateMutexW
GetCurrentDirectoryW
GetDateFormatW
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
GetCPInfo
RtlUnwind
RaiseException
LCMapStringW
LCMapStringA
GetStringTypeW
HeapAlloc
SetHandleCount
GetStdHandle
GetFileType
HeapCreate
HeapReAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapSize
ExitProcess
WriteFile
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeA
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
SetFilePointer
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
CloseHandle
CreateFileA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
SetEndOfFile
GetProcessHeap
ReadFile
user32
CharLowerBuffA
gdi32
GetCharABCWidthsFloatA
GetCharWidthA
Sections
.text Size: 260KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 33.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ