Static task
static1
Behavioral task
behavioral1
Sample
1d39abaa47a45fd4ff89e1183c6d7d9e7755d41962f8836d1d348d0c4ed3b1ee.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1d39abaa47a45fd4ff89e1183c6d7d9e7755d41962f8836d1d348d0c4ed3b1ee.exe
Resource
win10v2004-20230220-en
General
-
Target
07cbe5d6d8ce7e375e43a725e0691362.bin
-
Size
370KB
-
MD5
a92563d4654f41feafd6f1c4b8c20106
-
SHA1
cab1fe4cc3a550443899a2a8e81c0ef9659065e9
-
SHA256
259d1312ef2411c2e3860a8c923f62eeb0060247f3ced34d766bc3a8c5938f54
-
SHA512
8d3fc30b6def8b4f4169d5a299364eadabbe6a2a3ba47af3cce5baf94404970c2a417695cdebc3596c608808fc37a2434f83cc0501835141d26e69c8814f59ab
-
SSDEEP
6144:TIRe7wcb+7UDs4v2FkDwYHE4Kx8M+DgmiVFEG/p/SMuYL+7pna1l0tqeI:UUC7UDb2yDwYu8gmSuY6Fnql0tq1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/1d39abaa47a45fd4ff89e1183c6d7d9e7755d41962f8836d1d348d0c4ed3b1ee.exe
Files
-
07cbe5d6d8ce7e375e43a725e0691362.bin.zip
Password: infected
-
1d39abaa47a45fd4ff89e1183c6d7d9e7755d41962f8836d1d348d0c4ed3b1ee.exe.exe windows x86
Password: infected
ce94ff4312bf546ec7c0ebb9ac311897
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ConvertThreadToFiber
GetConsoleAliasExesLengthA
InterlockedIncrement
SetMailslotInfo
GetLogicalDriveStringsW
WritePrivateProfileSectionA
CreateDirectoryW
FreeEnvironmentStringsA
GetModuleHandleW
GetTickCount
EnumCalendarInfoExW
WaitNamedPipeW
EnumTimeFormatsW
SetProcessPriorityBoost
GetSystemDirectoryW
SetFileShortNameW
GetPrivateProfileStructW
GetCalendarInfoA
GetProcessHandleCount
LeaveCriticalSection
GetFileAttributesA
GetFileAttributesW
WriteConsoleW
SetSystemPowerState
GetModuleFileNameW
CompareStringW
GetVolumePathNameA
GetDriveTypeW
EnumSystemLocalesA
GetPrivateProfileIntW
GetProcAddress
MoveFileW
SetComputerNameA
SearchPathA
LoadLibraryA
InterlockedExchangeAdd
OpenWaitableTimerW
LocalAlloc
DeleteTimerQueue
SetCalendarInfoW
BuildCommDCBAndTimeoutsW
FindFirstVolumeMountPointW
IsSystemResumeAutomatic
AddAtomW
GetDiskFreeSpaceA
OpenJobObjectW
FindAtomA
FindFirstVolumeMountPointA
EnumDateFormatsA
GetModuleHandleA
FindNextFileW
GetStringTypeW
GetConsoleTitleW
SetThreadAffinityMask
DeleteFileW
AreFileApisANSI
CreateMutexW
GetShortPathNameA
GetVolumeNameForVolumeMountPointA
CloseHandle
SetStdHandle
GetLastError
HeapFree
DeleteFileA
WideCharToMultiByte
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
HeapAlloc
IsProcessorFeaturePresent
EncodePointer
DecodePointer
HeapCreate
EnterCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
GetCPInfo
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
ExitProcess
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
RtlUnwind
LCMapStringW
MultiByteToWideChar
SetFilePointer
GetConsoleCP
GetConsoleMode
HeapSize
LoadLibraryW
HeapReAlloc
FlushFileBuffers
CreateFileW
gdi32
GetCharABCWidthsW
SelectObject
shell32
DuplicateIcon
Sections
.text Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 297KB - Virtual size: 4.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ