Static task
static1
Behavioral task
behavioral1
Sample
695ebf4db6a46967bdecfe41ea5db0b2f96845a460f7d16eb2fcd3111f2dd36c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
695ebf4db6a46967bdecfe41ea5db0b2f96845a460f7d16eb2fcd3111f2dd36c.exe
Resource
win10v2004-20230220-en
General
-
Target
323317d95d40108aa42de6bff8ee8bbd.bin
-
Size
339KB
-
MD5
450f31475910d6313b05dc89374f9b89
-
SHA1
2dce50a826b995cad8c21e3091e21ef8fd4b6ee1
-
SHA256
e277cfeb552a2e1543c4d419e6e52b4dc4678580199814e0e4da3d0ccc7605d5
-
SHA512
dab87f81cd4e2396160166154c9ea66eee53a11459d1be6d87d7e9bca49e67b0698ac3d91dce67a3b7ff4e0fa3dac60792d9454f4f2fbff4e2f0d6898e2a162c
-
SSDEEP
6144:ppJ+b2/wv6Iltg/7Vxu36RCB1WFOxMZnLhuLCEI4+xMMN23/pKToAdiiP8185iq4:EWwiMtg/7VxHCeX9LdEt+xNq/pKTLp8v
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/695ebf4db6a46967bdecfe41ea5db0b2f96845a460f7d16eb2fcd3111f2dd36c.exe
Files
-
323317d95d40108aa42de6bff8ee8bbd.bin.zip
Password: infected
-
695ebf4db6a46967bdecfe41ea5db0b2f96845a460f7d16eb2fcd3111f2dd36c.exe.exe windows x86
Password: infected
3865ca37561d2aa29b9e83d3d87488fe
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedIncrement
OpenJobObjectA
WaitNamedPipeA
GetCurrentProcess
SetMailslotInfo
WritePrivateProfileSectionA
FreeEnvironmentStringsA
GetModuleHandleW
GetTickCount
SetFileTime
GetDriveTypeA
GlobalAlloc
GetSystemDirectoryW
LoadLibraryW
GetSystemPowerStatus
GetCalendarInfoA
GetConsoleAliasExesLengthW
LeaveCriticalSection
GetExitCodeProcess
GetFileAttributesW
GetVolumePathNameA
GetShortPathNameA
GetPrivateProfileIntW
DeleteFiber
GetLogicalDriveStringsA
GetProcAddress
AttachConsole
CreateMutexW
SetComputerNameA
SearchPathA
OpenThread
WriteConsoleA
InterlockedExchangeAdd
OpenWaitableTimerW
DeleteTimerQueue
MoveFileA
FindFirstVolumeMountPointW
AddAtomW
SetFileApisToANSI
BeginUpdateResourceA
GetDiskFreeSpaceA
GetPrivateProfileStructA
FindNextFileA
GetModuleHandleA
FreeEnvironmentStringsW
GetCurrentDirectoryA
CompareStringA
GetShortPathNameW
SetCalendarInfoA
SetThreadAffinityMask
SetFileShortNameA
GetWindowsDirectoryW
EnumCalendarInfoExA
EnumSystemLocalesW
DeleteFileA
SetProcessAffinityMask
MoveFileW
GetVolumeNameForVolumeMountPointA
GetLastError
HeapFree
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
HeapAlloc
IsProcessorFeaturePresent
EncodePointer
DecodePointer
HeapCreate
EnterCriticalSection
SetFilePointer
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
ExitProcess
WriteFile
GetModuleFileNameW
GetModuleFileNameA
WideCharToMultiByte
GetEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RtlUnwind
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapReAlloc
WriteConsoleW
MultiByteToWideChar
LCMapStringW
GetStringTypeW
CloseHandle
CreateFileW
gdi32
SelectPalette
GetCharABCWidthsA
Sections
.text Size: 81KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 297KB - Virtual size: 760KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.jofilun Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ