Static task
static1
Behavioral task
behavioral1
Sample
dfe1b2d706af16a41a5fd06259b9a7c892ec9e35803831c03099a05da6d7250c.exe
Resource
win7-20230705-en
General
-
Target
ecc2dce7c0878fbc57d8450562beb3d4.bin
-
Size
227KB
-
MD5
cb9b2914bc60b41781b2bc6b67e7cf3d
-
SHA1
20d2eca0fafe3039cc311d75073c827f4fb2fb9e
-
SHA256
5d43a979545215a55510cede0427c8c1992b636beb7887125d9a29e4112340e0
-
SHA512
b3e06f43c26be4ee453ddf27e5d73401eb839214537fcbd92995d5c481ca9a5468c71154224c697e9e21e405b401d2f28803ed3a7f18801dca8a662d805957c1
-
SSDEEP
6144:a9l0mCRZjmENLIWBNVuC2yXby1sgnJIQKC4:KZQAILDCcL0vK5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/dfe1b2d706af16a41a5fd06259b9a7c892ec9e35803831c03099a05da6d7250c.exe
Files
-
ecc2dce7c0878fbc57d8450562beb3d4.bin.zip
Password: infected
-
dfe1b2d706af16a41a5fd06259b9a7c892ec9e35803831c03099a05da6d7250c.exe.exe windows x86
Password: infected
9ac61ea6788febecd79130a98b49f128
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateMutexW
SetLocaleInfoA
GetStringTypeA
GetProfileIntW
FindResourceExW
EnumCalendarInfoW
GetLogicalDriveStringsW
UnlockFile
GetTickCount
GetConsoleAliasesA
GetCompressedFileSizeW
ClearCommBreak
GetDateFormatA
LoadLibraryW
CopyFileW
GetSystemWindowsDirectoryA
DeleteVolumeMountPointW
FindNextVolumeW
MulDiv
ReplaceFileW
GetVolumePathNameA
GetDevicePowerState
FindFirstFileA
SetLastError
GetComputerNameA
GetProcAddress
GetLongPathNameA
BeginUpdateResourceW
EnumDateFormatsExA
IsValidCodePage
EnumSystemCodePagesW
LoadLibraryA
OpenMutexA
GetProcessWorkingSetSize
LocalAlloc
CreateFileMappingW
CreateHardLinkW
GetNumberFormatW
SetCurrentDirectoryW
HeapWalk
GetModuleHandleA
ReadConsoleInputW
GetWindowsDirectoryW
CloseHandle
CreateFileA
lstrcmpiA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
MultiByteToWideChar
GetStartupInfoW
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapAlloc
GetLastError
HeapFree
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
Sleep
HeapSize
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetCPInfo
GetACP
GetOEMCP
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
VirtualAlloc
HeapReAlloc
RtlUnwind
InitializeCriticalSectionAndSpinCount
LCMapStringA
LCMapStringW
GetStringTypeW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
RaiseException
user32
CharUpperBuffW
GetMenuBarInfo
LoadMenuA
DdeQueryStringW
GetClipboardOwner
CharToOemBuffA
gdi32
GetCharABCWidthsI
Sections
.text Size: 220KB - Virtual size: 219KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 258KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ