Static task
static1
Behavioral task
behavioral1
Sample
2f07faa842c8e1409552e105891a79b6ded1798ef8b3e849044c1d16275f6deb.exe
Resource
win7-20230220-en
General
-
Target
60e81e6e9776e4558df6a89774e58ab2.bin
-
Size
255KB
-
MD5
63733c8591e8671be7303b4545f46288
-
SHA1
0964e87904e48a456948ca56eab991bb7760c676
-
SHA256
6154cd93d6a6b3a230f6a0b8780706edbb39a2ca86674a22f1bb781f3687d885
-
SHA512
ac19dcd21d19809ce3b3e4de8061320a4593be416135a98f579651d78acbde01ad097b28dafd68d6ee6f8f1034805e0d6d19109d28d32e7ac125c089867f0739
-
SSDEEP
6144:czQSA2i/HgDsDVwi5zELAbfIziC1vKUNd40bO3wAJ:cUSNaEAbgz7KUn4PwAJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/2f07faa842c8e1409552e105891a79b6ded1798ef8b3e849044c1d16275f6deb.exe
Files
-
60e81e6e9776e4558df6a89774e58ab2.bin.zip
Password: infected
-
2f07faa842c8e1409552e105891a79b6ded1798ef8b3e849044c1d16275f6deb.exe.exe windows x86
Password: infected
38174083713e590cf897cdb95c1ddaa8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedIncrement
SetMailslotInfo
GetLogicalDriveStringsW
WritePrivateProfileSectionA
FreeEnvironmentStringsA
GetModuleHandleW
GetTickCount
EnumCalendarInfoExW
WaitNamedPipeW
EnumTimeFormatsW
SetProcessPriorityBoost
GetVolumePathNameW
GetPrivateProfileIntA
GetPrivateProfileStructW
GetSystemPowerStatus
GetCalendarInfoA
GetProcessHandleCount
GetConsoleAliasExesLengthW
LeaveCriticalSection
GetFileAttributesA
GetFileAttributesW
GetModuleFileNameW
GetProcAddress
MoveFileW
SetComputerNameA
SearchPathA
ConvertThreadToFiber
LoadLibraryA
InterlockedExchangeAdd
LocalAlloc
DeleteTimerQueue
MoveFileA
BuildCommDCBAndTimeoutsW
FindFirstVolumeMountPointW
IsSystemResumeAutomatic
GetDiskFreeSpaceA
OpenJobObjectW
FindFirstVolumeMountPointA
EnumDateFormatsA
GetModuleHandleA
FindNextFileW
GetStringTypeW
GetConsoleTitleW
EnumDateFormatsW
CompareStringA
GetShortPathNameW
SetCalendarInfoA
SetThreadAffinityMask
SetFileShortNameA
FindAtomW
GetVolumeNameForVolumeMountPointW
DeleteFileW
EnumSystemLocalesW
AreFileApisANSI
GetDriveTypeW
OpenWaitableTimerA
CreateMutexW
WideCharToMultiByte
InterlockedDecrement
InterlockedExchange
MultiByteToWideChar
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
GetLastError
HeapFree
DeleteFileA
HeapReAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetCPInfo
RaiseException
RtlUnwind
HeapAlloc
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
HeapCreate
SetFilePointer
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetACP
GetOEMCP
IsValidCodePage
ExitProcess
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoW
HeapSize
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetConsoleCP
GetConsoleMode
SetStdHandle
FlushFileBuffers
LoadLibraryW
WriteConsoleW
CreateFileW
CloseHandle
gdi32
GetCharABCWidthsW
SelectObject
Sections
.text Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 161KB - Virtual size: 40.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 114KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ