Static task
static1
Behavioral task
behavioral1
Sample
90e12268c6886da75cf395936df7635c52dfcd3bcf074396dd9c97fa55c9eb5b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
90e12268c6886da75cf395936df7635c52dfcd3bcf074396dd9c97fa55c9eb5b.exe
Resource
win10v2004-20230220-en
General
-
Target
31e6d2018b345fe69bbc2cf8f69215b3.bin
-
Size
138KB
-
MD5
458b63a00b330e8f322fd8e80dc0d772
-
SHA1
c0b6d984a7e03c11b0d1d5ae87011da3e5ebcae2
-
SHA256
e0791b9bc6856c02c0f9a4a41f1bbee6daee4801dd18dc563e669c61e1fe0760
-
SHA512
c072914cae31a517b899b4da8d5d31002546893e90980e93673c23319ce645ec32826455581cf0f5939c339e1ead21451e2b1be417dfbafdc0ad59f4060b91e2
-
SSDEEP
3072:7bmwcaQTrtHE3BZ1R+2BzBaJ2CCsT8jiaqWqvAk4eZqqh1TZvuG:7iTa8mxIytaJEiHGk4eUQTgG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/90e12268c6886da75cf395936df7635c52dfcd3bcf074396dd9c97fa55c9eb5b.exe
Files
-
31e6d2018b345fe69bbc2cf8f69215b3.bin.zip
Password: infected
-
90e12268c6886da75cf395936df7635c52dfcd3bcf074396dd9c97fa55c9eb5b.exe.exe windows x86
Password: infected
1b96bbe7f35030dff720bfd4a2e62f20
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLogicalDriveStringsW
WaitForSingleObject
AddConsoleAliasW
GetModuleHandleW
GetTickCount
VirtualFree
GetConsoleAliasesA
GetNumberFormatA
ReadConsoleW
GetConsoleAliasExesW
FindResourceExA
GlobalAlloc
GetCalendarInfoW
FormatMessageW
GetSystemTimeAdjustment
GetVersionExW
FindNextVolumeW
ReadFile
CreateActCtxA
GetACP
GlobalUnlock
GetLargestConsoleWindowSize
InterlockedExchange
_lwrite
GetCurrentDirectoryW
ReadConsoleOutputCharacterA
GetProcAddress
VirtualAlloc
IsValidCodePage
LoadLibraryA
WriteConsoleA
FindFirstVolumeMountPointW
SetConsoleCtrlHandler
SetCurrentDirectoryW
FindAtomA
GetModuleFileNameA
GetCommTimeouts
CreateMutexA
VirtualProtect
GetCurrentThreadId
FileTimeToLocalFileTime
GetCurrentProcessId
OpenFileMappingA
CommConfigDialogW
WriteConsoleW
GetLocaleInfoA
CreateTimerQueue
GetLastError
LocalUnlock
GetConsoleOutputCP
GetProcessHeap
SetEndOfFile
SetStdHandle
FlushFileBuffers
HeapFree
Sleep
ExitProcess
GetCommandLineA
GetStartupInfoA
HeapAlloc
HeapCreate
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
HeapSize
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
SetHandleCount
GetStdHandle
GetFileType
WriteFile
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetCPInfo
GetOEMCP
CloseHandle
CreateFileA
SetFilePointer
GetConsoleCP
GetConsoleMode
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
user32
GetCaretPos
CharUpperBuffW
LoadMenuW
gdi32
GetCharacterPlacementW
advapi32
MapGenericMask
ReportEventW
ole32
ReadClassStg
winhttp
WinHttpOpen
msimg32
AlphaBlend
Sections
.text Size: 141KB - Virtual size: 140KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ