Static task
static1
Behavioral task
behavioral1
Sample
706d1d79242e5150e6b2a7cc2b336cfbf19e959bbd1d88de73186311ffe96fb2.exe
Resource
win7-20230220-en
General
-
Target
263a5ea865d180a5370ea13405129055.bin
-
Size
220KB
-
MD5
e8889b50efcbcb70b398726342c8b4f3
-
SHA1
61f11083b8b26635826b86ead6dbe28e259f498f
-
SHA256
5061426b41f66bd166a3e1a6ed4efef4d61d2d3eed0500706d929f0070e237c1
-
SHA512
bd29683c5932aab6aec318eaa834b7488494ed34ada87f5f3379e801b65105f3dd6b5a5deec0c11b4362818ed0164e4304fd8b569951ab1847272b5a5aad0e16
-
SSDEEP
6144:nWJjm8W4Z0xC2bQhMvzYf49KRQwnRz4Ig1ZIvgq:nWJaKwQhMzY5nRUIgnUgq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/706d1d79242e5150e6b2a7cc2b336cfbf19e959bbd1d88de73186311ffe96fb2.exe
Files
-
263a5ea865d180a5370ea13405129055.bin.zip
Password: infected
-
706d1d79242e5150e6b2a7cc2b336cfbf19e959bbd1d88de73186311ffe96fb2.exe.exe windows x86
Password: infected
73d4962fbae1e4c40152701417afb0c7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ConvertThreadToFiber
GetConsoleAliasExesLengthA
InterlockedIncrement
OpenJobObjectA
InterlockedDecrement
SetMailslotInfo
GetLogicalDriveStringsW
FreeEnvironmentStringsA
GetTickCount
EnumCalendarInfoExW
WaitNamedPipeW
GetDriveTypeA
GetVolumePathNameW
GetSystemDirectoryW
SetFileShortNameW
LoadLibraryW
GetPrivateProfileStructW
GetCalendarInfoA
LeaveCriticalSection
GetFileAttributesA
GetExitCodeProcess
GetFileAttributesW
WriteConsoleW
SetSystemPowerState
WritePrivateProfileSectionW
CompareStringW
CreateMutexW
GetPrivateProfileIntW
GetCurrentDirectoryW
GetProcAddress
AttachConsole
SetComputerNameA
SearchPathA
OpenThread
InterlockedExchangeAdd
OpenWaitableTimerW
LocalAlloc
SetCalendarInfoW
MoveFileA
FindFirstVolumeMountPointW
AddAtomW
SetFileApisToANSI
GetDiskFreeSpaceA
GetModuleHandleA
CancelTimerQueueTimer
FreeEnvironmentStringsW
FindNextFileW
GetStringTypeW
EnumDateFormatsW
SetThreadAffinityMask
DeleteFileW
GetCurrentProcessId
EnumSystemLocalesW
SetProcessAffinityMask
GetShortPathNameA
GetVolumeNameForVolumeMountPointA
GetLastError
HeapFree
DeleteFileA
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
HeapAlloc
IsProcessorFeaturePresent
EncodePointer
DecodePointer
HeapCreate
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
EnterCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
GetModuleHandleW
ExitProcess
WriteFile
GetModuleFileNameW
GetModuleFileNameA
WideCharToMultiByte
GetEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
QueryPerformanceCounter
GetSystemTimeAsFileTime
Sleep
SetFilePointer
GetConsoleCP
GetConsoleMode
RtlUnwind
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapReAlloc
FlushFileBuffers
SetStdHandle
MultiByteToWideChar
LCMapStringW
CloseHandle
CreateFileW
gdi32
GetCharABCWidthsW
SelectObject
shell32
DuplicateIcon
Sections
.text Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 160KB - Virtual size: 622KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ