Static task
static1
Behavioral task
behavioral1
Sample
5457285bf50fb555f651ddc0fcd19174bcdef1eb6356ea7c5872dc1a5847dd11.exe
Resource
win7-20230621-en
General
-
Target
2e149c2509e751783f67aac9af2e57e5.bin
-
Size
219KB
-
MD5
e61bbf9fe0a78323d90a61bf2f1fda07
-
SHA1
c62ae8978715386ffa5f8d254bf7f4ba89fbe24f
-
SHA256
37530db64361f15936442e2b1f6dbe3920f096d9ca093c1d012825046f053d24
-
SHA512
c65a98cdccaad24eaef941c658dda62f532421564c855861e287f385bd6cbbd069177c31c6a28b7139bce41d9ff4d172c825d09e4c2ae7819ec87ab4b6433009
-
SSDEEP
6144:SqGumShJ+oNLoQN3yue2M4LyimJBAxr4XNpeg/Wa/LKj6dxh:jVoQJyuevKhmJyxsXNj/V/Ln
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/5457285bf50fb555f651ddc0fcd19174bcdef1eb6356ea7c5872dc1a5847dd11.exe
Files
-
2e149c2509e751783f67aac9af2e57e5.bin.zip
Password: infected
-
5457285bf50fb555f651ddc0fcd19174bcdef1eb6356ea7c5872dc1a5847dd11.exe.exe windows x86
Password: infected
1feb2748e9c85b40aca77d212fe28304
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetPrivateProfileSectionNamesW
SearchPathW
GetConsoleAliasesLengthW
InterlockedIncrement
InterlockedDecrement
WaitNamedPipeA
WriteConsoleInputA
FreeEnvironmentStringsA
GetTickCount
GetCurrentThread
ConvertFiberToThread
GetNumberFormatA
EnumTimeFormatsW
GetCommandLineA
GetPriorityClass
GlobalAlloc
LoadLibraryW
FreeConsole
GetCalendarInfoA
GetConsoleAliasExesLengthW
LeaveCriticalSection
GetExitCodeProcess
CreateSemaphoreA
GetFileAttributesW
WriteConsoleW
GetCompressedFileSizeA
CompareStringW
GetVolumePathNameA
EnumSystemLocalesA
InterlockedExchange
GetCPInfoExW
GetLastError
GetCurrentDirectoryW
GetProcAddress
BeginUpdateResourceW
MoveFileW
GlobalGetAtomNameA
SearchPathA
SetFileAttributesA
GlobalFree
GetTempFileNameA
OpenWaitableTimerA
LoadLibraryA
OpenThread
MoveFileA
VirtualLock
AddAtomA
HeapWalk
OpenJobObjectW
FindNextFileA
EnumDateFormatsA
GetModuleHandleA
CreateMailslotA
WaitForDebugEvent
GetShortPathNameW
GetCPInfoExA
SetCalendarInfoA
SetFileShortNameA
GetWindowsDirectoryW
GetVolumeNameForVolumeMountPointW
GetFileInformationByHandle
ReadConsoleOutputCharacterW
OpenFileMappingA
LocalFileTimeToFileTime
CreateFileW
CloseHandle
WideCharToMultiByte
MultiByteToWideChar
HeapReAlloc
HeapSetInformation
GetStartupInfoW
RaiseException
HeapAlloc
HeapFree
IsProcessorFeaturePresent
EnterCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
TerminateProcess
GetCurrentProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
HeapCreate
SetFilePointer
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
RtlUnwind
LCMapStringW
GetStringTypeW
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapSize
ReadFile
user32
GetAltTabInfoA
Sections
.text Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 198KB - Virtual size: 2.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kefih Size: 1024B - Virtual size: 580B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ