Static task
static1
Behavioral task
behavioral1
Sample
36613338c586fb7ddf36d7cda3c336180127030cc16f558e20e725f8542f01e6.exe
Resource
win7-20230220-en
General
-
Target
f01d05137762dd36a5c548279246b113.bin
-
Size
237KB
-
MD5
ac1b58700e754fcf92796523f4317c24
-
SHA1
3cc90bb6eed7c6a9bea58d07da2d064dc6a87ecd
-
SHA256
004756f18ea58837c6146ab2ffa0a666e86a1ca8820fa2fa1d2c5a217d5541bd
-
SHA512
76bc07f39b0d7c9b9139ad168721a8841f8db32c4903193ac85f951d0666222e1ec9b1f44113746059a1b29690a85d22e417b766a1beb05e7fc56e2debffe179
-
SSDEEP
6144:B+W8pSFopSt0ThgQZ9CdcTaETQa7ChKJ7Jj31:8WclpE0lgG9nTQECYJp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/36613338c586fb7ddf36d7cda3c336180127030cc16f558e20e725f8542f01e6.exe
Files
-
f01d05137762dd36a5c548279246b113.bin.zip
Password: infected
-
36613338c586fb7ddf36d7cda3c336180127030cc16f558e20e725f8542f01e6.exe.exe windows x86
Password: infected
0af0c6e3fe2b48c822ae2dd664bde01d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetMailslotInfo
GetSystemWindowsDirectoryW
FreeEnvironmentStringsA
GetProcessPriorityBoost
EnumCalendarInfoExW
GetConsoleTitleA
WaitNamedPipeW
EnumTimeFormatsW
GetDriveTypeA
GetVolumePathNameW
GetPrivateProfileIntA
GetSystemPowerStatus
GetCalendarInfoA
GetProcessHandleCount
GetConsoleAliasExesLengthW
LeaveCriticalSection
GetFileAttributesA
WriteConsoleW
GetModuleFileNameW
GetShortPathNameA
EnumSystemLocalesA
DeleteFiber
SetLastError
InterlockedDecrement
HeapSize
SetComputerNameA
SearchPathA
OpenWaitableTimerA
LoadLibraryA
Process32FirstW
GetProcessId
InterlockedExchangeAdd
LocalAlloc
DeleteTimerQueue
SetCalendarInfoW
BuildCommDCBAndTimeoutsW
IsSystemResumeAutomatic
AddAtomW
OpenJobObjectW
GetPrivateProfileStructA
FindFirstVolumeMountPointA
EnumDateFormatsA
GetModuleHandleA
FindNextFileW
CompareStringA
SetFileShortNameA
FindAtomW
AreFileApisANSI
InterlockedIncrement
GetProcAddress
GetVolumeNameForVolumeMountPointA
GetLastError
HeapFree
DeleteFileA
WideCharToMultiByte
HeapReAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
HeapAlloc
IsProcessorFeaturePresent
HeapCreate
EnterCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
TerminateProcess
GetCurrentProcess
SetFilePointer
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
GetCurrentThreadId
ExitProcess
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
GetConsoleCP
GetConsoleMode
RtlUnwind
SetStdHandle
FlushFileBuffers
LCMapStringW
MultiByteToWideChar
GetStringTypeW
LoadLibraryW
CloseHandle
CreateFileW
gdi32
GetCharABCWidthsW
SelectObject
Sections
.text Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 183KB - Virtual size: 40.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ