Static task
static1
Behavioral task
behavioral1
Sample
dc162f6994b714c3f26ce9f5a6490d7b395ffebfb01e1949720177c3af03d7ab.exe
Resource
win7-20230621-en
General
-
Target
5f46d71351eaa94763c589b62e73591a.bin
-
Size
232KB
-
MD5
10a72a8be16159c0924ff1bd459b4033
-
SHA1
596ed8da5be4b4aa1f9b047feefb54dbc7d2f6e2
-
SHA256
82184fe326360924e97f603427d1ec8c4b1f69e26afc860a177ba0f43d3a8ed8
-
SHA512
6b8a3ff93c59053211a89729e7cabf104fa1cb9a966c3c2fe244d9869440e36ddc6e5bbca0818eb5efc301e3ebc0969f9f42a0d51e21031dc887af689eb92af1
-
SSDEEP
3072:5vwKDBjw19kuBqwfV1B1D6zQfYwNgGQGodWjzZVOD0l+Vm+btR8LkhDIA9F8df6X:/uBqy1zffb5QzNm+btR8ohDFk2xRvfR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/dc162f6994b714c3f26ce9f5a6490d7b395ffebfb01e1949720177c3af03d7ab.exe
Files
-
5f46d71351eaa94763c589b62e73591a.bin.zip
Password: infected
-
dc162f6994b714c3f26ce9f5a6490d7b395ffebfb01e1949720177c3af03d7ab.exe.exe windows x86
Password: infected
f4925062616b110bd402bdb61edf2e9d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDateFormatW
CreateMutexW
EnumDateFormatsExW
TlsGetValue
VirtualQuery
SetEndOfFile
ClearCommError
EnumCalendarInfoW
GetCurrentProcess
GetSystemWindowsDirectoryW
OpenSemaphoreA
SetCommBreak
LockFile
GetModuleHandleW
GetTickCount
EscapeCommFunction
ReadConsoleW
FormatMessageA
GetWindowsDirectoryA
FindResourceExA
LoadLibraryW
ReadConsoleInputA
GetACP
GetVolumePathNameA
ReleaseSemaphore
ReplaceFileA
GetStringTypeExA
GetConsoleAliasesW
InterlockedExchange
GetProfileIntA
SetCurrentDirectoryA
GetLogicalDriveStringsA
OpenMutexW
SetLastError
GetProcAddress
BeginUpdateResourceW
CopyFileA
LoadLibraryA
WriteConsoleA
GetCurrentDirectoryA
FindNextVolumeA
CloseHandle
CreateFileA
FlushFileBuffers
WriteConsoleW
GetConsoleOutputCP
SetStdHandle
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
ExitProcess
GetCommandLineA
GetStartupInfoA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetLastError
HeapFree
RtlUnwind
RaiseException
TerminateProcess
IsDebuggerPresent
HeapAlloc
GetCPInfo
GetOEMCP
IsValidCodePage
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
SetHandleCount
GetStdHandle
GetFileType
WriteFile
GetModuleFileNameA
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
VirtualAlloc
HeapReAlloc
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
SetFilePointer
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
user32
LoadMenuA
CharUpperBuffA
LoadMenuW
GetSysColorBrush
DdeQueryStringA
SetCaretPos
CharToOemBuffW
GetClipboardOwner
Sections
.text Size: 224KB - Virtual size: 224KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 38.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 81KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ