Static task
static1
Behavioral task
behavioral1
Sample
e7d57cbe651e668904a6b154b97642d64f5b09546d1f20350c7ca5946f985f5f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e7d57cbe651e668904a6b154b97642d64f5b09546d1f20350c7ca5946f985f5f.exe
Resource
win10v2004-20230220-en
General
-
Target
fcab17a170881b4ecedfc91ab91cd1f4.bin
-
Size
40KB
-
MD5
4bc5ed071b5cabe46579840988721e10
-
SHA1
11c6f10e373a0037326f924953d91a99874bc0c9
-
SHA256
f6eb02d6cb0f961c53f564f580da6a4dc1a6976f46259178667525a079457171
-
SHA512
9786766d772df046291ab4fe20612db5212340f9646f171476bbfa52463a7d70bdb24135bef6c4c2492ef319c57cd2153bfe565afa86716fa08cac5a0ac86c5a
-
SSDEEP
768:0e9i4L2GoKehT6gSIFmk/rTD/+yQ3TD+TYEB+ACIyGygEb2EbBNmn2:0eBL2GkGgrmk//zZQ3OTYEB+x9nKn2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/e7d57cbe651e668904a6b154b97642d64f5b09546d1f20350c7ca5946f985f5f.exe
Files
-
fcab17a170881b4ecedfc91ab91cd1f4.bin.zip
Password: infected
-
e7d57cbe651e668904a6b154b97642d64f5b09546d1f20350c7ca5946f985f5f.exe.exe windows x64
Password: infected
de8c59512ca98fb3e224769147985370
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
RegQueryValueExW
RegDeleteValueW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegDeleteKeyExW
RegCloseKey
kernel32
HeapSetInformation
GetProcAddress
FreeLibrary
GetCurrentProcessId
GetLastError
GetCommandLineW
LoadLibraryW
QueryPerformanceCounter
GetModuleHandleW
SetUnhandledExceptionFilter
GetStartupInfoW
Sleep
GetSystemTimeAsFileTime
GetTickCount
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetCurrentThreadId
gdi32
GetStockObject
user32
RegisterClassW
CreateWindowExW
DestroyWindow
DefWindowProcW
LoadCursorW
msvcrt
_fmode
_commode
?terminate@@YAXXZ
__C_specific_handler
__wgetmainargs
_amsg_exit
_XcptFilter
iswspace
_wcmdln
_initterm
__setusermatherr
_cexit
_exit
exit
__set_app_type
memset
ntdll
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 228B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ