Static task
static1
Behavioral task
behavioral1
Sample
10d388586975935c6c7d713696bdb56629d81f098c4d1207b1c0523cc0ff187c.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
10d388586975935c6c7d713696bdb56629d81f098c4d1207b1c0523cc0ff187c.exe
Resource
win10v2004-20230621-en
General
-
Target
c8db347ef42527fd13a9fd09eb744a5a.bin
-
Size
149KB
-
MD5
559c5697688d431f4c2b5a3b2959fae2
-
SHA1
741e4e7e1bbb575171869772389809b9ba6e10f3
-
SHA256
ddfc38136c73fb8b7f10ce6dede66b9dd5d71883fa1f05a7b80b2c837fe2bc42
-
SHA512
829d324ae34537e89847768d7925d321934c0b516a5296ec5d2db8922f253c07b326a0595f650a10727b638441d557f8d1d470149cf43f027b6952728d444a0d
-
SSDEEP
3072:r124mFv5Zh28bLO0/rYoVm7qWA3hM6J6xkqKnXheSMh:ri88bzr5VmLXg6xklnX2h
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/10d388586975935c6c7d713696bdb56629d81f098c4d1207b1c0523cc0ff187c.exe
Files
-
c8db347ef42527fd13a9fd09eb744a5a.bin.zip
Password: infected
-
10d388586975935c6c7d713696bdb56629d81f098c4d1207b1c0523cc0ff187c.exe.exe windows x86
Password: infected
c8681af63c4b3bc7041fe674efea6dd2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStringTypeA
LCMapStringW
LCMapStringA
LoadLibraryA
RtlUnwind
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
GetConsoleMode
GetConsoleCP
SetFilePointer
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
GetStringTypeW
GetCommandLineW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetStdHandle
WriteFile
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
HeapSize
ExitProcess
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
FlushFileBuffers
WideCharToMultiByte
LocalAlloc
LocalFree
CreateProcessW
GetVersion
CloseHandle
CreateEventW
GetProcAddress
GetLastError
GetModuleFileNameW
FormatMessageW
Sleep
LoadLibraryW
GetModuleHandleW
GetSystemWindowsDirectoryW
FreeEnvironmentStringsW
HeapReAlloc
VirtualAlloc
EnterCriticalSection
HeapFree
ExitThread
ResumeThread
CreateThread
HeapAlloc
GetCommandLineA
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
GetModuleHandleA
user32
DialogBoxIndirectParamW
InflateRect
SetWindowTextW
CreateDesktopW
DestroyWindow
SetCursor
TranslateAcceleratorW
GetWindowRect
SetActiveWindow
GetMessageW
PostQuitMessage
TrackPopupMenu
RegisterWindowMessageW
PostMessageW
GetKeyState
SetForegroundWindow
DialogBoxParamW
LoadCursorW
CallNextHookEx
OpenDesktopW
FindWindowW
GetClientRect
SetFocus
GetDC
TranslateMessage
LoadAcceleratorsW
ChildWindowFromPoint
LoadIconW
OffsetRect
InvalidateRect
BringWindowToTop
SystemParametersInfoW
ReleaseDC
GetDlgItem
EndDialog
GetSysColor
SetWindowPos
GetCursorPos
CheckDlgButton
ShowWindow
CreatePopupMenu
GetSysColorBrush
IsDlgButtonChecked
SwitchDesktop
SetThreadDesktop
CreateWindowExW
InsertMenuW
SetWindowsHookExW
MessageBoxW
RegisterClassW
GetSystemMetrics
SendMessageW
UnregisterHotKey
DestroyMenu
RegisterHotKey
DefWindowProcW
MoveWindow
DispatchMessageW
GetWindowPlacement
gdi32
StartPage
GetDeviceCaps
SetMapMode
StartDocW
EndDoc
BitBlt
SetTextColor
DeleteDC
CreateFontIndirectW
StretchBlt
SetBkMode
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
GetObjectW
SetStretchBltMode
GetStockObject
EndPage
comdlg32
PrintDlgW
advapi32
RegCreateKeyW
RegSetValueExW
RegCloseKey
GetSecurityDescriptorSacl
RegOpenKeyExW
SetSecurityInfo
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegDeleteValueW
RegOpenKeyW
RegQueryValueExW
RegCreateKeyExW
shell32
ShellExecuteW
Shell_NotifyIconW
Sections
.text Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Size: 103KB - Virtual size: 102KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE