Static task
static1
Behavioral task
behavioral1
Sample
d2349196b611e963c2099768c35e7b9de02436e1bccfe1b49d8311c41cd1ef55.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
d2349196b611e963c2099768c35e7b9de02436e1bccfe1b49d8311c41cd1ef55.exe
Resource
win10v2004-20230621-en
General
-
Target
ad302d8824a2e13a170604176ae1b571.bin
-
Size
270KB
-
MD5
b44e2b37c1d975d85970067e8523a8c9
-
SHA1
37f8d1449c6248930d7782c3fc846472e0164992
-
SHA256
382dc3f18e5915c86bc0c98f994e2029532d1b35c158216074ea91dc6495ab5e
-
SHA512
a8b0e6a81d0de9feeebc32798882865bbcdc30be361fd0f717666ed17468cfe6ad15f25c4acd9ac7a6304a41197fa93bd78f420859e852b9bcec24749fe4dac9
-
SSDEEP
6144:evRjo9Rf8dc5KB9dG7/JO8t8R2B+Y6BMmBDrxqldAczRcPr7PjHy:evmz6W+y7xGGjgRqLBzRcPr7jHy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/d2349196b611e963c2099768c35e7b9de02436e1bccfe1b49d8311c41cd1ef55.exe
Files
-
ad302d8824a2e13a170604176ae1b571.bin.zip
Password: infected
-
d2349196b611e963c2099768c35e7b9de02436e1bccfe1b49d8311c41cd1ef55.exe.exe windows x86
Password: infected
e452f645761244958e067c651397e7c8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetPrivateProfileSectionNamesW
SearchPathW
GetConsoleAliasesLengthW
InterlockedIncrement
InterlockedDecrement
WaitNamedPipeA
WriteConsoleInputA
FreeEnvironmentStringsA
GetTickCount
GetCurrentThread
ConvertFiberToThread
GetNumberFormatA
EnumTimeFormatsW
GetCommandLineA
GetPriorityClass
GlobalAlloc
LoadLibraryW
FreeConsole
GetCalendarInfoA
GetConsoleAliasExesLengthW
LeaveCriticalSection
GetExitCodeProcess
CreateSemaphoreA
GetFileAttributesW
WriteConsoleW
GetCompressedFileSizeA
CompareStringW
GetVolumePathNameA
EnumSystemLocalesA
GetCPInfoExW
GetLastError
GetCurrentDirectoryW
GetProcAddress
BeginUpdateResourceW
MoveFileW
GlobalGetAtomNameA
SearchPathA
SetFileAttributesA
GlobalFree
GetTempFileNameA
OpenWaitableTimerA
LoadLibraryA
OpenThread
InterlockedExchangeAdd
MoveFileA
VirtualLock
AddAtomA
HeapWalk
OpenJobObjectW
FindNextFileA
EnumDateFormatsA
GetModuleHandleA
CreateMailslotA
WaitForDebugEvent
GetShortPathNameW
GetCPInfoExA
SetCalendarInfoA
SetFileShortNameA
GetWindowsDirectoryW
GetVolumeNameForVolumeMountPointW
GetFileInformationByHandle
ReadConsoleOutputCharacterW
OpenFileMappingA
LocalFileTimeToFileTime
ReadFile
CreateFileW
WideCharToMultiByte
MultiByteToWideChar
HeapSetInformation
GetStartupInfoW
RaiseException
HeapAlloc
HeapFree
IsProcessorFeaturePresent
EnterCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
TerminateProcess
GetCurrentProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
SetFilePointer
CloseHandle
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
RtlUnwind
LCMapStringW
GetStringTypeW
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapSize
HeapReAlloc
user32
GetAltTabInfoA
Sections
.text Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 209KB - Virtual size: 23.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.loy Size: 1024B - Virtual size: 580B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ