Static task
static1
Behavioral task
behavioral1
Sample
2ff27833a253326bc98d702f8dc8d31c.exe
Resource
win7-20230712-en
General
-
Target
fff2156f1ff79f1a53901cbe84de0371-sample.zip
-
Size
123KB
-
MD5
1981d51afaa488c7de59753b591e3e20
-
SHA1
9df94f986372f028b4e51eb778b245fcb43595b9
-
SHA256
452c435034ae219f9de00d4065dd787f7c5f588dd8d59373c439c6bf662c2c3b
-
SHA512
78a084aecbd341f6a7261a59c2d2607f03d0f2a219da6a782597c3487937a98b0b2af5b73305f47ffab9a2a4873ff9f477a199a8bd2348b53c48a4fef42d5110
-
SSDEEP
3072:kXx9kVgngDipw1/904sHGd2KItxJxFnMoxmfHH:kHoguipwl04/d21hniPH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/2ff27833a253326bc98d702f8dc8d31c
Files
-
fff2156f1ff79f1a53901cbe84de0371-sample.zip.zip
Password: infected
-
2ff27833a253326bc98d702f8dc8d31c.exe windows x86
Password: infected
f678da7882c86102a2a8a7a8ee56bca1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ConvertThreadToFiber
OpenJobObjectA
InterlockedDecrement
WaitNamedPipeA
SetMailslotInfo
GetLogicalDriveStringsW
WritePrivateProfileSectionA
FreeEnvironmentStringsA
GetModuleHandleW
GetTickCount
EnumCalendarInfoExW
GetDriveTypeA
GlobalAlloc
GetSystemDirectoryW
SetFileShortNameW
LoadLibraryW
GetCalendarInfoA
GetConsoleAliasExesLengthW
LeaveCriticalSection
GetExitCodeProcess
GetFileAttributesW
WriteConsoleW
SetSystemPowerState
CompareStringW
GetVolumePathNameA
GetShortPathNameA
CreateMutexW
GetCurrentDirectoryW
GetProcAddress
AttachConsole
MoveFileW
SetComputerNameA
SearchPathA
OpenThread
InterlockedExchangeAdd
OpenWaitableTimerW
SetCalendarInfoW
MoveFileA
FindFirstVolumeMountPointW
AddAtomW
SetFileApisToANSI
GetDiskFreeSpaceA
GetPrivateProfileStructA
FindNextFileA
GetModuleHandleA
CancelTimerQueueTimer
FreeEnvironmentStringsW
SetThreadAffinityMask
GetWindowsDirectoryW
GetCurrentProcessId
EnumSystemLocalesW
DeleteFileA
SetProcessAffinityMask
GetPrivateProfileIntW
GetVolumeNameForVolumeMountPointA
GetLastError
HeapFree
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
HeapAlloc
IsProcessorFeaturePresent
EncodePointer
DecodePointer
HeapCreate
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
EnterCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
ExitProcess
WriteFile
GetModuleFileNameW
GetModuleFileNameA
WideCharToMultiByte
GetEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
QueryPerformanceCounter
GetSystemTimeAsFileTime
Sleep
SetFilePointer
GetConsoleCP
GetConsoleMode
RtlUnwind
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapReAlloc
FlushFileBuffers
SetStdHandle
MultiByteToWideChar
LCMapStringW
GetStringTypeW
CloseHandle
CreateFileW
gdi32
GetCharABCWidthsW
SelectPalette
Sections
.text Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 79KB - Virtual size: 542KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.becow Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ