Static task
static1
Behavioral task
behavioral1
Sample
e2f75ca08fa958f8a4fa25f2e0e76cf63f6af45bcff1166fa67f4b2e561f9bbb.exe
Resource
win7-20230621-en
General
-
Target
a2013cfe8484dbf0ff43dda5fa838bec.bin
-
Size
250KB
-
MD5
46a8727e82a27538d17fb933cf69738d
-
SHA1
8584a9a4f0deb1844dba95f5613db4a558454cc9
-
SHA256
c7d5b254f27a40cd1601319618a9e2bbda04a6a9e699e5683b892055f645f9d1
-
SHA512
1eac00ac34d4b14e85829d5ec52f7e95daf682024128e711296d9ee7ef79f3ab9005d6cfa834ed77622ae3c0ef76b5805e2f80b10d563c97c35257d3e2dd503c
-
SSDEEP
6144:NXUhzi4h7w6kplyM2u/7hPVSc7mcipqSIfGt+FthWGos:NkhHi94MR7apam+FtP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/e2f75ca08fa958f8a4fa25f2e0e76cf63f6af45bcff1166fa67f4b2e561f9bbb.exe
Files
-
a2013cfe8484dbf0ff43dda5fa838bec.bin.zip
Password: infected
-
e2f75ca08fa958f8a4fa25f2e0e76cf63f6af45bcff1166fa67f4b2e561f9bbb.exe.exe windows x86
Password: infected
435e7ef59b3c6347cf62e2c58eef72c0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetPrivateProfileSectionNamesW
SearchPathW
GetConsoleAliasesLengthW
InterlockedIncrement
OpenJobObjectA
InterlockedDecrement
WaitNamedPipeA
WriteConsoleInputA
FreeEnvironmentStringsA
GetTickCount
GetCurrentThread
ConvertFiberToThread
EnumTimeFormatsW
GetCommandLineA
GetPriorityClass
GlobalAlloc
LoadLibraryW
FreeConsole
GetCalendarInfoA
GetConsoleAliasExesLengthW
LeaveCriticalSection
CreateSemaphoreA
GetFileAttributesW
WriteConsoleW
GetCompressedFileSizeA
GetVolumePathNameA
CreateMailslotW
EnumSystemLocalesA
InterlockedExchange
GetCPInfoExW
GetLastError
GetCurrentDirectoryW
GetProcAddress
BeginUpdateResourceW
MoveFileW
GlobalGetAtomNameA
SearchPathA
GlobalFree
GetTempFileNameA
OpenWaitableTimerA
LoadLibraryA
OpenThread
SetCalendarInfoW
GetNumberFormatW
VirtualLock
AddAtomA
HeapWalk
OpenJobObjectW
FindNextFileA
EnumDateFormatsA
GetModuleHandleA
GetCurrentDirectoryA
CompareStringA
WaitForDebugEvent
GetShortPathNameW
GetCPInfoExA
SetFileShortNameA
GetWindowsDirectoryW
GetVolumeNameForVolumeMountPointW
GetFileInformationByHandle
ReadConsoleOutputCharacterW
OpenFileMappingA
LocalFileTimeToFileTime
CloseHandle
CreateFileW
MoveFileA
WideCharToMultiByte
MultiByteToWideChar
HeapReAlloc
HeapSetInformation
GetStartupInfoW
RaiseException
HeapAlloc
HeapFree
IsProcessorFeaturePresent
EnterCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
TerminateProcess
GetCurrentProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
HeapCreate
SetFilePointer
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
RtlUnwind
LCMapStringW
GetStringTypeW
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapSize
ReadFile
user32
GetAltTabInfoA
Sections
.text Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 214KB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.daxi Size: 1024B - Virtual size: 580B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 105KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ