Static task
static1
Behavioral task
behavioral1
Sample
4fd20682fbc3324675f319d9c2961d002ff409c3bbd4afc6e19dd7e8f2135ac9.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
4fd20682fbc3324675f319d9c2961d002ff409c3bbd4afc6e19dd7e8f2135ac9.exe
Resource
win10v2004-20230621-en
General
-
Target
caa4bd1dd6401ee5e6505d3aeeb3ad1c.bin
-
Size
312KB
-
MD5
411a8854d6a21c3a0e6e328094452120
-
SHA1
6a2c71fcaa4e08794d92624ec6734673f2e4952d
-
SHA256
bba2ed10786e84c6c962030129790ae0703c578d4afd243d9bc2a8efb81f6f35
-
SHA512
72e18f67740f37c2ff31fb114341d3af5765fb5637e5dad3c0cc0a1ff2580f3a5a84e66b99670c07ec00f9f2cd32ebccd8705f1e22ebc5646be0f6f102968593
-
SSDEEP
6144:AeQhqxkedwkrU0YOSyzzgl04fHtdwL5b5ecLotHMILpLQc47/I:AhqxndbQ0Gyz8lh0L5b5edtHTLQcwA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/4fd20682fbc3324675f319d9c2961d002ff409c3bbd4afc6e19dd7e8f2135ac9.exe
Files
-
caa4bd1dd6401ee5e6505d3aeeb3ad1c.bin.zip
Password: infected
-
4fd20682fbc3324675f319d9c2961d002ff409c3bbd4afc6e19dd7e8f2135ac9.exe.exe windows x64
Password: infected
8c241f2856d051653f18c9a46994d6c6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ntdll
RtlUnwindEx
RtlPcToFileHeader
RtlCaptureContext
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlUnwind
kernel32
LoadLibraryExW
CreateFileW
HeapSize
LoadLibraryA
GetProcAddress
CloseHandle
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
EncodePointer
DecodePointer
InitializeCriticalSectionEx
MultiByteToWideChar
WideCharToMultiByte
LCMapStringEx
GetStringTypeW
GetCPInfo
HeapReAlloc
ReadConsoleW
SetFilePointerEx
GetFileSizeEx
RaiseException
GetLastError
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
WriteConsoleW
GetCurrentProcess
TerminateProcess
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
HeapAlloc
HeapFree
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetProcessHeap
GetFileType
SetStdHandle
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
ReadFile
Sections
.text Size: 322KB - Virtual size: 322KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 395KB - Virtual size: 394KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 211KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ