Static task
static1
Behavioral task
behavioral1
Sample
6fb30c4e262ddab6ff3891852c92f5cf640e130da29af9e1445f803ace1418eb.exe
Resource
win7-20230621-en
General
-
Target
9fd1506305b26c9371423b21887f3fe6.bin
-
Size
138KB
-
MD5
5e45e1621eefe8e8a440ef39516e0614
-
SHA1
e8c2650cb6e667767d866c760367ed017992faae
-
SHA256
7b3a4b65714697e8b145c27818104107b7f9c4661851be7964fed68bbff57c68
-
SHA512
5fa3dd015587716bdec1ae3a087b2bc06d2c100626f0583b39efe7f61c5e0c5f32aae4aec5713df25044878f13bb6943d9d069dd3ce13aab5c0b79a88ef3920c
-
SSDEEP
3072:vl1lkCJHgielTOkfflxw2Cms3GHIdnZSO41NuAN78XTm4A9:Nrk4aFOkn/FIqOCMAN78XTmt9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/6fb30c4e262ddab6ff3891852c92f5cf640e130da29af9e1445f803ace1418eb.exe
Files
-
9fd1506305b26c9371423b21887f3fe6.bin.zip
Password: infected
-
6fb30c4e262ddab6ff3891852c92f5cf640e130da29af9e1445f803ace1418eb.exe.exe windows x86
Password: infected
b578e3789f52bf10595635e957a47d40
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetPrivateProfileSectionNamesW
SearchPathW
GetConsoleAliasesLengthW
InterlockedIncrement
OpenJobObjectA
InterlockedDecrement
WaitNamedPipeA
WriteConsoleInputA
FreeEnvironmentStringsA
GetTickCount
GetCurrentThread
ConvertFiberToThread
EnumTimeFormatsW
GetCommandLineA
GetPriorityClass
GlobalAlloc
LoadLibraryW
FreeConsole
GetCalendarInfoA
GetConsoleAliasExesLengthW
LeaveCriticalSection
GetExitCodeProcess
CreateSemaphoreA
GetFileAttributesW
WriteConsoleW
GetCompressedFileSizeA
GetVolumePathNameA
CreateMailslotW
EnumSystemLocalesA
GetCPInfoExW
GetLastError
GetCurrentDirectoryW
GetProcAddress
BeginUpdateResourceW
MoveFileW
GlobalGetAtomNameA
SearchPathA
SetFileAttributesA
GlobalFree
GetTempFileNameA
OpenWaitableTimerA
LoadLibraryA
OpenThread
InterlockedExchangeAdd
SetCalendarInfoW
GetNumberFormatW
VirtualLock
AddAtomA
HeapWalk
OpenJobObjectW
FindNextFileA
EnumDateFormatsA
GetModuleHandleA
GetCurrentDirectoryA
CompareStringA
WaitForDebugEvent
GetShortPathNameW
GetCPInfoExA
SetFileShortNameA
GetWindowsDirectoryW
GetVolumeNameForVolumeMountPointW
GetFileInformationByHandle
ReadConsoleOutputCharacterW
OpenFileMappingA
LocalFileTimeToFileTime
ReadFile
CreateFileW
MoveFileA
WideCharToMultiByte
MultiByteToWideChar
HeapSetInformation
GetStartupInfoW
RaiseException
HeapAlloc
HeapFree
IsProcessorFeaturePresent
EnterCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
TerminateProcess
GetCurrentProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
SetFilePointer
CloseHandle
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
RtlUnwind
LCMapStringW
GetStringTypeW
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapSize
HeapReAlloc
user32
GetAltTabInfoA
Sections
.text Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 77KB - Virtual size: 23.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.baf Size: 1024B - Virtual size: 580B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ