Static task
static1
Behavioral task
behavioral1
Sample
bf37c23288267a7cb0d477da8f35e80a0164037a45a3abb5e8a0f78c7d928406.exe
Resource
win7-20230621-en
General
-
Target
3c17a0ed892042868a7fea9d4.bin
-
Size
800KB
-
MD5
ff3c0c527c80b484a2e44e39f800961e
-
SHA1
25c27dfa8f4c2ed09d7348c014502004bf32ec03
-
SHA256
c415d00692b43361653b0d735ffa7cab7d12eeeba5a9df32974bb1e3f645331f
-
SHA512
d010cc810640d8683a96dd6fc6441eeb2d0ec288f3a51537995c893f11cabd8cc4e47bcc1a519770e2f4f33896a7a72bcce82921254db2b09440174484572c8c
-
SSDEEP
12288:S5rh3Xfh31Cwr9+jOH5h0Gg87n9SsKQJfxzyKFVmRq983ECVgAF/infLxgq63N/G:MPh/9+Q30YhSs/fo6x9OEC20qfGqYFG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/bf37c23288267a7cb0d477da8f35e80a0164037a45a3abb5e8a0f78c7d928406.exe
Files
-
3c17a0ed892042868a7fea9d4.bin.zip
Password: infected
-
bf37c23288267a7cb0d477da8f35e80a0164037a45a3abb5e8a0f78c7d928406.exe.exe windows x64
2ef2ff32f6659c552380e66347106d0f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
SystemFunction036
kernel32
CloseHandle
SetLastError
GetLastError
GetFinalPathNameByHandleW
SwitchToThread
WaitForSingleObject
GetExitCodeProcess
AddVectoredExceptionHandler
SetThreadStackGuarantee
HeapAlloc
GetProcessHeap
HeapFree
HeapReAlloc
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
GetModuleHandleA
GetProcAddress
GetCurrentThread
TryAcquireSRWLockExclusive
GetStdHandle
GetConsoleMode
MultiByteToWideChar
WriteConsoleW
WaitForSingleObjectEx
LoadLibraryA
CreateMutexA
GetCurrentProcess
ReleaseMutex
GetEnvironmentVariableW
RtlLookupFunctionEntry
GetModuleHandleW
FormatMessageW
GetTempPathW
CreateFileW
GetFullPathNameW
SetHandleInformation
GetEnvironmentStringsW
FreeEnvironmentStringsW
CompareStringOrdinal
GetSystemDirectoryW
GetModuleFileNameW
GetWindowsDirectoryW
CreateProcessW
GetFileAttributesW
DuplicateHandle
GetCurrentProcessId
CreateNamedPipeW
CreateThread
ReadFileEx
SleepEx
WriteFileEx
ExitProcess
QueryPerformanceCounter
QueryPerformanceFrequency
GetSystemTimeAsFileTime
GetCurrentDirectoryW
RtlCaptureContext
AcquireSRWLockShared
ReleaseSRWLockShared
RtlVirtualUnwind
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
InitializeSListHead
GetCurrentThreadId
ws2_32
WSAGetLastError
ioctlsocket
freeaddrinfo
connect
send
WSASend
recv
WSASocketW
WSACleanup
WSAStartup
setsockopt
closesocket
getsockopt
select
getaddrinfo
bcrypt
BCryptGenRandom
ntdll
NtWriteFile
RtlNtStatusToDosError
vcruntime140
__current_exception
__C_specific_handler
memcmp
memset
memmove
__CxxFrameHandler3
__current_exception_context
memcpy
api-ms-win-crt-runtime-l1-1-0
_initterm_e
__p___argc
__p___argv
_cexit
_c_exit
_register_thread_local_exe_atexit_callback
_initterm
_get_initial_narrow_environment
_exit
_initialize_onexit_table
_register_onexit_function
_crt_atexit
terminate
_initialize_narrow_environment
_configure_narrow_argv
_seh_filter_exe
_set_app_type
exit
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__p__commode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-heap-l1-1-0
free
_set_new_mode
Sections
.text Size: 892KB - Virtual size: 891KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 734KB - Virtual size: 734KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ