Static task
static1
Behavioral task
behavioral1
Sample
1ad56287fa3c495ffee5719603969b4ebec9eb856011e1d042481e97908311d3.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
1ad56287fa3c495ffee5719603969b4ebec9eb856011e1d042481e97908311d3.exe
Resource
win10v2004-20230621-en
General
-
Target
76edc33ad9b87ea8fec576b6614114cf.bin
-
Size
864KB
-
MD5
f962da8590f4db2a375ea11502f85822
-
SHA1
674ff68829a3ba529eb454a258fa674ad4f4901a
-
SHA256
4408ed3002174aa93b795d1597e5fe1030d4cfb9bc8ce5b427b2b9d1e1390af2
-
SHA512
10a95d7e8050492ad5323e4d3e3f02226e4029b8b00114f12b5cc9d1ad7dabb4a1d88faab788e6f3c3d494786848685b7834a4313d3269f60090b05bdd430aec
-
SSDEEP
24576:b5JrjzphrAX1hofjTMxXl0OUak6F9MyUZ:b5JXzzrAlhqjw1jF9FUZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/1ad56287fa3c495ffee5719603969b4ebec9eb856011e1d042481e97908311d3.exe
Files
-
76edc33ad9b87ea8fec576b6614114cf.bin.zip
Password: infected
-
1ad56287fa3c495ffee5719603969b4ebec9eb856011e1d042481e97908311d3.exe.exe windows x64
Password: infected
0f5cc683fa39edbe3ca8321b37bf56bc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
RegEnumKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
user32
CharNextExA
MessageBoxA
comctl32
InitCommonControlsEx
kernel32
SetEndOfFile
GetTimeZoneInformation
GetCommandLineA
CloseHandle
GetLastError
QueryPerformanceCounter
QueryPerformanceFrequency
WaitForSingleObject
GetExitCodeProcess
GetExitCodeThread
CreateProcessA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
LocalFree
FormatMessageA
LoadLibraryA
FindClose
FindFirstFileA
FindNextFileA
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
HeapFree
HeapAlloc
HeapReAlloc
IsDebuggerPresent
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcessId
SetFilePointerEx
CreateThread
GetCurrentThreadId
ExitThread
LoadLibraryExW
RtlUnwindEx
DeleteCriticalSection
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
GetStdHandle
WriteFile
GetModuleFileNameW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetProcessHeap
GetFileType
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetConsoleCP
GetConsoleMode
SetEnvironmentVariableA
SetEnvironmentVariableW
GetFileAttributesExW
FlushFileBuffers
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
OutputDebugStringW
HeapSize
CompareStringW
LCMapStringW
GetStringTypeW
WriteConsoleW
ReadFile
ReadConsoleW
FileTimeToLocalFileTime
GetFileInformationByHandle
PeekNamedPipe
GetFullPathNameW
GetCurrentDirectoryW
CreateFileW
Sections
.text Size: 119KB - Virtual size: 119KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.upx0 Size: 1017KB - Virtual size: 1016KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ