Static task
static1
Behavioral task
behavioral1
Sample
2828697e13a2357b6fd3bdb56f036037d66cd858844fc478da9a22f9a51dcbfb.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2828697e13a2357b6fd3bdb56f036037d66cd858844fc478da9a22f9a51dcbfb.exe
Resource
win10v2004-20230220-en
General
-
Target
1b1a0a90ae41567cf14abd205e7dec5f.bin
-
Size
241KB
-
MD5
f38f22b35ef0dbdc3fcc7c6765c86a01
-
SHA1
f504bc37af7d929fe185a9cd61ae70864855355b
-
SHA256
de444712ad276d6ed31813bd357352bd8e5ef29f2308650e762fde0506cafb79
-
SHA512
63e7c56f19bf0a9634e165f86a5bdf043f4c01125ea3efca0fd67d7b71a337bdc495acb39be464121f9f242d2987cbcc02f5a4d96af2a0664328242d94268815
-
SSDEEP
6144:LwVZDKtRrxT3vwcj/gYLfQBqPxPuxBwFBWLk:LURQRBwwLfNPByw3f
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/2828697e13a2357b6fd3bdb56f036037d66cd858844fc478da9a22f9a51dcbfb.exe
Files
-
1b1a0a90ae41567cf14abd205e7dec5f.bin.zip
Password: infected
-
2828697e13a2357b6fd3bdb56f036037d66cd858844fc478da9a22f9a51dcbfb.exe.exe windows x86
Password: infected
4089a35c9e048a4d2101826d92d4e0df
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedIncrement
WaitNamedPipeA
GetCurrentProcess
SetMailslotInfo
GetModuleHandleW
GetTickCount
SetFileTime
GlobalAlloc
GetSystemDirectoryW
SetFileShortNameW
LoadLibraryW
GetSystemPowerStatus
FreeConsole
GetCalendarInfoA
GetFileAttributesA
GetVolumePathNameA
GetShortPathNameA
DeleteFiber
GetProcAddress
MoveFileW
SetComputerNameA
EnterCriticalSection
SearchPathA
GetConsoleAliasExesLengthA
WriteConsoleA
InterlockedExchangeAdd
DeleteTimerQueue
FindFirstVolumeMountPointW
BeginUpdateResourceA
GetDiskFreeSpaceA
AddAtomA
GetPrivateProfileStructA
FindNextFileA
GetModuleHandleA
OpenFileMappingW
FreeEnvironmentStringsW
GetCurrentDirectoryA
GetShortPathNameW
SetCalendarInfoA
SetThreadAffinityMask
GetVolumeNameForVolumeMountPointW
EnumCalendarInfoExA
EnumSystemLocalesW
DeleteFileA
SetProcessAffinityMask
ExitProcess
GetLastError
MoveFileA
MultiByteToWideChar
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
HeapAlloc
HeapFree
IsProcessorFeaturePresent
EncodePointer
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCPInfo
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
CloseHandle
WriteFile
GetModuleFileNameW
GetModuleFileNameA
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringW
GetStringTypeW
Sleep
SetFilePointer
GetConsoleCP
GetConsoleMode
RtlUnwind
SetStdHandle
FlushFileBuffers
HeapSize
HeapReAlloc
WriteConsoleW
CreateFileW
gdi32
SelectPalette
GetCharABCWidthsA
Sections
.text Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 189KB - Virtual size: 652KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.way Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ