Static task
static1
Behavioral task
behavioral1
Sample
75d816877db74794e371d1e20824410e90cf2fc56ad3906fd4c60363d6f4824f.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
75d816877db74794e371d1e20824410e90cf2fc56ad3906fd4c60363d6f4824f.exe
Resource
win10v2004-20230703-en
General
-
Target
a030d2e07e3353a69d920a940a073a25.bin
-
Size
315KB
-
MD5
28982a8896c0c3a5ce0fce797d419d8e
-
SHA1
9ecfbe130bef704d07fd82be2d6f01c2282f2598
-
SHA256
b34ecff10961ed8db3c4f664fd18da095b8f8049525d4441e545c62a0df893a4
-
SHA512
9062d547d277cc829a385be9564d64ab725704d95f33927c310a4cd2e09343394aa0dbae41ae146b04425f9f3504be16ca733e3b529b108e01659e5ac3b368ce
-
SSDEEP
6144:Di0Uv74W/Yk+v9mcAqd9CaWSsl239u2nxruC/KuZ:DihMWA539dwaDsl239vnxrf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/75d816877db74794e371d1e20824410e90cf2fc56ad3906fd4c60363d6f4824f.exe
Files
-
a030d2e07e3353a69d920a940a073a25.bin.zip
Password: infected
-
75d816877db74794e371d1e20824410e90cf2fc56ad3906fd4c60363d6f4824f.exe.exe windows x86
Password: infected
5826e2bea2981d413e896f41d08c994e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
WaitForSingleObject
CreateMutexW
Sleep
CreateThread
VirtualAlloc
VirtualProtect
GetModuleHandleA
GetProcAddress
LoadLibraryA
lstrlenW
FreeConsole
WriteConsoleW
CloseHandle
CreateFileW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
RtlUnwind
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
EncodePointer
RaiseException
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
HeapAlloc
HeapFree
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
GetFileType
GetStringTypeW
CompareStringW
LCMapStringW
GetProcessHeap
HeapSize
HeapReAlloc
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
SetFilePointerEx
DecodePointer
ole32
CoCancelCall
Sections
.text Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.SDp7V Size: 399KB - Virtual size: 399KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE