Static task
static1
Behavioral task
behavioral1
Sample
785b2a3bae21b0829a762f63f440f4c5a8e3a0ae05d69e51cbcd508ba9fbf847.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
785b2a3bae21b0829a762f63f440f4c5a8e3a0ae05d69e51cbcd508ba9fbf847.exe
Resource
win10v2004-20230703-en
General
-
Target
386cc3677f14f7a1a13ed6b3ebfa6b93.bin
-
Size
43KB
-
MD5
c80220e0c1f2d01dfc2b729b1c5a1f7e
-
SHA1
3b72fbd45fc95787393464a8b85bb017c54f48b7
-
SHA256
d2ce60b32f5f49406240fdd6794f9bd22396f37242f80cc58c78fa84a5a0bdd0
-
SHA512
57a926dd8fd1f4d2bb094441714b6dbe9d2ce93b53c1713051a81667caa7b2250d11b280e5a7160f9d662c487180f20968a893838eb637a3f72df3891ae50d8c
-
SSDEEP
768:OP+UdGP+vyo0lAUPju5gZQZtDDgPyQWsRuzjE/bsClamJNOFdkN9c3a7P6SmrgA2:jbAUP65mQPDsTYmJNkONn7P6zr/O5ipk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/785b2a3bae21b0829a762f63f440f4c5a8e3a0ae05d69e51cbcd508ba9fbf847.exe
Files
-
386cc3677f14f7a1a13ed6b3ebfa6b93.bin.zip
Password: infected
-
785b2a3bae21b0829a762f63f440f4c5a8e3a0ae05d69e51cbcd508ba9fbf847.exe.exe windows x86
Password: infected
87d23666eed4de810d9f30f0a8f34ab4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathCompactPathA
PathGetCharTypeW
StrNCatA
StrRStrIW
UrlCreateFromPathW
UrlGetLocationA
pdh
PdhAddCounterA
PdhBrowseCountersW
PdhEnumObjectsA
PdhLookupPerfNameByIndexW
PdhVbIsGoodStatus
oleaut32
VARIANT_UserMarshal
VarAnd
VarBstrFromCy
VarBstrFromI4
VarDecFromStr
VarUI1FromDate
VarUI1FromR4
VarUI2FromDisp
gdi32
CreateScalableFontResourceA
GetDeviceGammaRamp
GetEnhMetaFileBits
GetKerningPairs
GetSystemPaletteEntries
GetTextCharsetInfo
GetTextFaceW
RemoveFontMemResourceEx
StartPage
avifil32
AVISaveVW
AVIStreamReadData
EditStreamSetInfoA
msvfw32
DrawDibDraw
ICLocate
kernel32
CloseHandle
CreateFileW
DecodePointer
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileExW
FindNextFileW
FlushFileBuffers
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleCP
GetConsoleMode
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStringsW
GetFileType
GetLastError
GetModuleFileNameW
GetModuleHandleExW
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSectionAndSpinCount
InitializeSListHead
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
LCMapStringW
LeaveCriticalSection
LoadLibraryExW
MultiByteToWideChar
QueryPerformanceCounter
RaiseException
ReadConsoleW
ReadFile
RtlUnwind
SetEndOfFile
SetFilePointerEx
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
WideCharToMultiByte
WriteConsoleW
WriteFile
Sections
.text Size: 53KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.voltbl Size: 512B - Virtual size: 177B