Static task
static1
Behavioral task
behavioral1
Sample
ff254f67ef760b3bd0c0459c1b252c69933b65859f4d780d2de4dc330fe5f059.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
ff254f67ef760b3bd0c0459c1b252c69933b65859f4d780d2de4dc330fe5f059.exe
Resource
win10v2004-20230621-en
General
-
Target
b76abc21d0fa114c2957671c0fee077c.bin
-
Size
247KB
-
MD5
0f5b1988e5c5017c47871f32d8f280a0
-
SHA1
35cde5654a0147668cc0a55e5ae43b10766e4bc1
-
SHA256
16e62d7f2ca0321b5490cf7143ec2c505baa3e224a4d966c540e1ae4c9b1f404
-
SHA512
9ab774eaab33812855b432399c107f76c9549e046b74c1ddadf6b0967065c403aca30891dbb4eb30b199300ef363e282c1b733e21aaddc51cac1430b4355f03e
-
SSDEEP
6144:qi/HaGlpAx3op1H3kFpx2ejRRRtRcwtxEY:xHaGrAc3kjRRNchY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/ff254f67ef760b3bd0c0459c1b252c69933b65859f4d780d2de4dc330fe5f059.exe
Files
-
b76abc21d0fa114c2957671c0fee077c.bin.zip
Password: infected
-
ff254f67ef760b3bd0c0459c1b252c69933b65859f4d780d2de4dc330fe5f059.exe.exe windows x86
Password: infected
2374c2e3effb7cec5b64d024cc2c8613
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameA
GetDateFormatW
VirtualQuery
SetEndOfFile
ClearCommError
EnumCalendarInfoW
ReadConsoleA
InterlockedDecrement
GetSystemWindowsDirectoryW
LockFile
GetTickCount
FormatMessageA
GetVolumePathNameW
FindResourceExA
LoadLibraryW
IsValidLocale
SetCommConfig
FatalAppExitW
ReadConsoleInputA
WriteConsoleW
ReplaceFileW
GetCompressedFileSizeA
GetACP
ReleaseSemaphore
GetStringTypeExA
GetConsoleAliasesW
GetProfileIntA
GetLogicalDriveStringsA
OpenMutexW
GetLastError
SetLastError
GetProcAddress
CopyFileA
LoadLibraryA
SetCurrentDirectoryW
BeginUpdateResourceA
GetModuleFileNameA
CreateMutexA
CancelTimerQueueTimer
PurgeComm
GetCurrentDirectoryA
OpenSemaphoreW
FindFirstVolumeA
GetVersionExA
TlsAlloc
GetWindowsDirectoryW
GetVolumeNameForVolumeMountPointW
GetCurrentProcessId
CloseHandle
CreateFileA
FlushFileBuffers
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
InterlockedIncrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCommandLineA
GetStartupInfoA
HeapFree
RtlUnwind
RaiseException
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapAlloc
SetHandleCount
GetFileType
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
HeapSize
VirtualAlloc
HeapReAlloc
GetCPInfo
GetOEMCP
IsValidCodePage
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
InitializeCriticalSectionAndSpinCount
SetFilePointer
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
user32
CharToOemBuffA
CharUpperBuffA
LoadMenuW
SetMenu
GetSysColorBrush
SetCaretPos
GetClipboardOwner
Sections
.text Size: 246KB - Virtual size: 246KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 568KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ