Static task
static1
Behavioral task
behavioral1
Sample
7bce4ecdba0dec6ad52286615c8dc344bf7800e390f811dcb21ec4c42c1c9768.exe
Resource
win7-20230220-en
General
-
Target
17707edc41cafb123a032991f7ad8ae8.bin
-
Size
224KB
-
MD5
1d9a91fd8a5b1b26aed2dbc18751cbce
-
SHA1
4c9fbb1173a0f22b5543304b500b8e8b1fcc7bd1
-
SHA256
b25acd7ba5fa5c4eed53588bc39dd5e30ea9fb8bb7f4ff11c568919bf796679c
-
SHA512
b854697d346c46086bd81986de58f6b4bfa7cfc8284b52fe3a65bd4fadde01bf934e773d574d45ac5d70df79238a4a8f1d211b874e96979e791f04e1e6b75e6d
-
SSDEEP
6144:KmSkUb6CAtENcVDl7reS9DAjRRMhGYp0xC:ebItUcdlOs2MgYKxC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/7bce4ecdba0dec6ad52286615c8dc344bf7800e390f811dcb21ec4c42c1c9768.exe
Files
-
17707edc41cafb123a032991f7ad8ae8.bin.zip
Password: infected
-
7bce4ecdba0dec6ad52286615c8dc344bf7800e390f811dcb21ec4c42c1c9768.exe.exe windows x86
Password: infected
00238f2ba697aa7e23225a769e849753
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ConvertThreadToFiber
GetConsoleAliasExesLengthA
BuildCommDCBAndTimeoutsA
InterlockedIncrement
WaitNamedPipeA
SetMailslotInfo
GetLogicalDriveStringsW
CreateDirectoryW
FreeEnvironmentStringsA
GetTickCount
EnumCalendarInfoExW
GetConsoleTitleA
EnumTimeFormatsW
SetProcessPriorityBoost
GetSystemDirectoryW
SetFileShortNameW
GetPrivateProfileStructW
GetCalendarInfoA
GetProcessHandleCount
LeaveCriticalSection
GetFileAttributesA
GetExitCodeProcess
WriteConsoleW
SetSystemPowerState
WritePrivateProfileSectionW
GetModuleFileNameW
GetDriveTypeW
GetVolumePathNameA
GetShortPathNameA
EnumSystemLocalesA
GetPrivateProfileIntW
GetProcAddress
MoveFileW
EnumSystemCodePagesW
SetComputerNameA
SearchPathA
LoadLibraryA
InterlockedExchangeAdd
OpenWaitableTimerW
LocalAlloc
DeleteTimerQueue
SetCalendarInfoW
MoveFileA
FindFirstVolumeMountPointW
IsSystemResumeAutomatic
AddAtomW
SetFileApisToANSI
GetDiskFreeSpaceA
OpenJobObjectW
GetModuleHandleA
FindNextFileW
GetStringTypeW
EnumDateFormatsW
GetCurrentProcessId
DeleteFileA
CreateMutexW
CompareStringW
GetVolumeNameForVolumeMountPointA
CloseHandle
SetStdHandle
GetLastError
HeapFree
WideCharToMultiByte
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
HeapAlloc
IsProcessorFeaturePresent
EncodePointer
DecodePointer
HeapCreate
EnterCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
GetCPInfo
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
ExitProcess
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
Sleep
RtlUnwind
LCMapStringW
MultiByteToWideChar
SetFilePointer
GetConsoleCP
GetConsoleMode
HeapSize
LoadLibraryW
HeapReAlloc
FlushFileBuffers
CreateFileW
gdi32
GetCharABCWidthsW
SelectObject
shell32
DuplicateIcon
Sections
.text Size: 86KB - Virtual size: 86KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 160KB - Virtual size: 623KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ