Static task
static1
Behavioral task
behavioral1
Sample
413dd834ba736f77227c604c9e0b81fb23cff3075a42d857e88354cf50bfb6f1.exe
Resource
win7-20230220-en
General
-
Target
5b0c20bab743dd0ce2e3c644e35c106f.bin
-
Size
204KB
-
MD5
89e131e8347effcb18dc76d825eba02b
-
SHA1
32b13568da7f7630f6d111fa9842074c6f87061c
-
SHA256
6db827a7f81c3aad2a567badd23d3b9fda8607227ccee6b574b57639f2246824
-
SHA512
0d4ecc1b3dfaffee0f0af4631cbe588f0fdd48bbcd9c2c35d5706aa75414ae48a2d2a98f6bac52aa79a1383fb0f2ba39908c30fa14fa9a2a1b995e8410f1923a
-
SSDEEP
6144:Ir6Bv7pujASLsZ9BJYWiN1NSPE7lBF2d2w:Ir0v7/SLS9EzNmE7dVw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/413dd834ba736f77227c604c9e0b81fb23cff3075a42d857e88354cf50bfb6f1.exe
Files
-
5b0c20bab743dd0ce2e3c644e35c106f.bin.zip
Password: infected
-
413dd834ba736f77227c604c9e0b81fb23cff3075a42d857e88354cf50bfb6f1.exe.exe windows x86
Password: infected
b14a6a82fd1c1e39d5e11c743609d6e5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedIncrement
OpenJobObjectA
WaitNamedPipeA
SetMailslotInfo
WritePrivateProfileSectionA
FreeEnvironmentStringsA
GetModuleHandleW
GetTickCount
GetDriveTypeA
GlobalAlloc
GetSystemDirectoryW
LoadLibraryW
GetSystemPowerStatus
GetCalendarInfoA
GetConsoleAliasExesLengthW
LeaveCriticalSection
GetExitCodeProcess
GetFileAttributesW
WriteConsoleW
CompareStringW
GetVolumePathNameA
GetShortPathNameA
GetPrivateProfileIntW
DeleteFiber
GetLogicalDriveStringsA
GetProcAddress
CreateMutexW
MoveFileW
SetComputerNameA
SearchPathA
OpenThread
InterlockedExchangeAdd
OpenWaitableTimerW
DeleteTimerQueue
MoveFileA
FindFirstVolumeMountPointW
AddAtomW
SetFileApisToANSI
GetDiskFreeSpaceA
GetPrivateProfileStructA
FindNextFileA
GetModuleHandleA
FreeEnvironmentStringsW
GetCurrentDirectoryA
SetCalendarInfoA
SetThreadAffinityMask
SetFileShortNameA
GetWindowsDirectoryW
GetCurrentProcessId
EnumCalendarInfoExA
EnumSystemLocalesW
DeleteFileA
SetProcessAffinityMask
AttachConsole
GetVolumeNameForVolumeMountPointA
GetLastError
HeapFree
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
HeapAlloc
IsProcessorFeaturePresent
EncodePointer
DecodePointer
HeapCreate
EnterCriticalSection
SetFilePointer
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
ExitProcess
WriteFile
GetModuleFileNameW
GetModuleFileNameA
WideCharToMultiByte
GetEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetSystemTimeAsFileTime
Sleep
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RtlUnwind
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapReAlloc
MultiByteToWideChar
LCMapStringW
GetStringTypeW
CloseHandle
CreateFileW
gdi32
GetCharABCWidthsW
SelectPalette
Sections
.text Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 160KB - Virtual size: 623KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sotipih Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ