Static task
static1
Behavioral task
behavioral1
Sample
81f2eb51eb0ee98b170a84fdbf6a960dc705839b4caa6b1202cfe435242bba1c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
81f2eb51eb0ee98b170a84fdbf6a960dc705839b4caa6b1202cfe435242bba1c.exe
Resource
win10v2004-20230220-en
General
-
Target
1f19a6e9f49b54e0f930db95b5d68397.bin
-
Size
371KB
-
MD5
775e86ce4636bf031c25ee5f2b391d53
-
SHA1
765f80d2788d52f8c5de7524b1bc8f66859c4555
-
SHA256
3c3c787131e5d26c00112d209c93f9b334517341d805d9349644013465ab5309
-
SHA512
3078a96200f7b62e8ea98bfc50cd7f0fd39f8531a1b3666eba77be7ffe73e513bd9ea49a286db578779a41051efeb6e129f444aa5a97a387c201d6a756125647
-
SSDEEP
6144:cVaiUK92f1kIZ//9ZUWYNqgb94ZljBYnK+HZiaaPjt7zp7OnnVukRyOsh2:UXUK90L9JYUl1YKbaa7tvEnIk8B2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/81f2eb51eb0ee98b170a84fdbf6a960dc705839b4caa6b1202cfe435242bba1c.exe
Files
-
1f19a6e9f49b54e0f930db95b5d68397.bin.zip
Password: infected
-
81f2eb51eb0ee98b170a84fdbf6a960dc705839b4caa6b1202cfe435242bba1c.exe.exe windows x86
Password: infected
8a0d2b8704cd8d8211128f4a70bc1cff
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ConvertThreadToFiber
GetConsoleAliasExesLengthA
BuildCommDCBAndTimeoutsA
InterlockedIncrement
SetMailslotInfo
GetLogicalDriveStringsW
WritePrivateProfileSectionA
CreateDirectoryW
FreeEnvironmentStringsA
GetTickCount
EnumCalendarInfoExW
GetConsoleTitleA
WaitNamedPipeW
EnumTimeFormatsW
SetProcessPriorityBoost
GetSystemDirectoryW
SetFileShortNameW
GetPrivateProfileStructW
GetCalendarInfoA
GetProcessHandleCount
LeaveCriticalSection
GetFileAttributesA
WriteConsoleW
SetSystemPowerState
GetModuleFileNameW
CompareStringW
GetDriveTypeW
GetShortPathNameA
EnumSystemLocalesA
GetPrivateProfileIntW
GetProcAddress
MoveFileW
SetComputerNameA
SearchPathA
LoadLibraryA
InterlockedExchangeAdd
OpenWaitableTimerW
LocalAlloc
DeleteTimerQueue
SetCalendarInfoW
FindFirstVolumeMountPointW
IsSystemResumeAutomatic
AddAtomW
SetFileApisToANSI
GetDiskFreeSpaceA
OpenJobObjectW
FindAtomA
FindFirstVolumeMountPointA
EnumDateFormatsA
GetModuleHandleA
FindNextFileW
GetStringTypeW
SetThreadAffinityMask
DeleteFileW
CreateMutexW
GetVolumePathNameA
GetVolumeNameForVolumeMountPointA
CloseHandle
SetStdHandle
GetLastError
HeapFree
DeleteFileA
WideCharToMultiByte
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
HeapAlloc
IsProcessorFeaturePresent
EncodePointer
DecodePointer
HeapCreate
EnterCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
GetCPInfo
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
ExitProcess
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
RtlUnwind
LCMapStringW
MultiByteToWideChar
SetFilePointer
GetConsoleCP
GetConsoleMode
HeapSize
LoadLibraryW
HeapReAlloc
FlushFileBuffers
CreateFileW
gdi32
GetCharABCWidthsW
SelectObject
shell32
DuplicateIcon
Sections
.text Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 298KB - Virtual size: 761KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ