Static task
static1
Behavioral task
behavioral1
Sample
8e7c2890227d1b9441cacad8f01d2e5519094f7886f2477377aa5e2989f75f0f.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
8e7c2890227d1b9441cacad8f01d2e5519094f7886f2477377aa5e2989f75f0f.exe
Resource
win10v2004-20230621-en
General
-
Target
99404d638e22e6cd63226c2813467378.bin
-
Size
164KB
-
MD5
16fa541973f41830e15fd9ce93ae9765
-
SHA1
9e6cbd85f8020dee151cf7ce1ea00ec711859136
-
SHA256
01393b67e93ad188c5008fb812a53040e553c0b27ea16bce736f31da6f35f2cb
-
SHA512
a2d1c104a3d87177cf8db4ed5c03429d6b814ac043faf799b05688e1976e016c81f9c2379d3b6f2a45a4ccf1aefab9c70542b0529ab72b702394143d5588b6dc
-
SSDEEP
3072:qGA3SK6oRN4RGFPk0RpHQjnh3B5zx+33RbHzoGpvizaWlOMaa:qGA3STROH8k3BAsvvWll
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/8e7c2890227d1b9441cacad8f01d2e5519094f7886f2477377aa5e2989f75f0f.exe
Files
-
99404d638e22e6cd63226c2813467378.bin.zip
Password: infected
-
8e7c2890227d1b9441cacad8f01d2e5519094f7886f2477377aa5e2989f75f0f.exe.exe windows x86
Password: infected
c8681af63c4b3bc7041fe674efea6dd2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStringTypeA
LCMapStringW
LCMapStringA
LoadLibraryA
RtlUnwind
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
GetConsoleMode
GetConsoleCP
SetFilePointer
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
GetStringTypeW
GetCommandLineW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetStdHandle
WriteFile
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
HeapSize
ExitProcess
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
FlushFileBuffers
WideCharToMultiByte
LocalAlloc
LocalFree
CreateProcessW
GetVersion
CloseHandle
CreateEventW
GetProcAddress
GetLastError
GetModuleFileNameW
FormatMessageW
Sleep
LoadLibraryW
GetModuleHandleW
GetSystemWindowsDirectoryW
FreeEnvironmentStringsW
HeapReAlloc
VirtualAlloc
EnterCriticalSection
HeapFree
ExitThread
ResumeThread
CreateThread
HeapAlloc
GetCommandLineA
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
GetModuleHandleA
user32
DialogBoxIndirectParamW
InflateRect
SetWindowTextW
CreateDesktopW
DestroyWindow
SetCursor
TranslateAcceleratorW
GetWindowRect
SetActiveWindow
GetMessageW
PostQuitMessage
TrackPopupMenu
RegisterWindowMessageW
PostMessageW
GetKeyState
SetForegroundWindow
DialogBoxParamW
LoadCursorW
CallNextHookEx
OpenDesktopW
FindWindowW
GetClientRect
SetFocus
GetDC
TranslateMessage
LoadAcceleratorsW
ChildWindowFromPoint
LoadIconW
OffsetRect
InvalidateRect
BringWindowToTop
SystemParametersInfoW
ReleaseDC
GetDlgItem
EndDialog
GetSysColor
SetWindowPos
GetCursorPos
CheckDlgButton
ShowWindow
CreatePopupMenu
GetSysColorBrush
IsDlgButtonChecked
SwitchDesktop
SetThreadDesktop
CreateWindowExW
InsertMenuW
SetWindowsHookExW
MessageBoxW
RegisterClassW
GetSystemMetrics
SendMessageW
UnregisterHotKey
DestroyMenu
RegisterHotKey
DefWindowProcW
MoveWindow
DispatchMessageW
GetWindowPlacement
gdi32
StartPage
GetDeviceCaps
SetMapMode
StartDocW
EndDoc
BitBlt
SetTextColor
DeleteDC
CreateFontIndirectW
StretchBlt
SetBkMode
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
GetObjectW
SetStretchBltMode
GetStockObject
EndPage
comdlg32
PrintDlgW
advapi32
RegCreateKeyW
RegSetValueExW
RegCloseKey
GetSecurityDescriptorSacl
RegOpenKeyExW
SetSecurityInfo
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegDeleteValueW
RegOpenKeyW
RegQueryValueExW
RegCreateKeyExW
shell32
ShellExecuteW
Shell_NotifyIconW
Sections
.text Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Size: 121KB - Virtual size: 121KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE