Static task
static1
Behavioral task
behavioral1
Sample
d6494e4de74639753cb61e5bca8cab807aa25b90ebdfac53498ed917bee13a00.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
d6494e4de74639753cb61e5bca8cab807aa25b90ebdfac53498ed917bee13a00.exe
Resource
win10v2004-20230703-en
General
-
Target
e156b217823113c33840ccc2b656eb4d.bin
-
Size
143KB
-
MD5
f74ed3d266003e9a804204ed580a4424
-
SHA1
f1a8eb7991f5e0f599f39de8dad2b53d002ddeca
-
SHA256
de8afa7f3e0c5d6ec99bb1bf7abaeecff6233dfb102f92d08d4d9761b9e29af1
-
SHA512
6975a08739cc05ed8878c113667f597c9fe2d966d784ff0ef59d9306f111fa39f9a029337e018de0f24c4cb4bfedee89555644da996b64350c5ce0a272eb298e
-
SSDEEP
3072:Vf/GvQywYisppp1dY6nPleH77HF8q53MHfjWuQpxVNMJGMw7A:BGvSWddYQYHPHFZpMHSuuPOa7A
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/d6494e4de74639753cb61e5bca8cab807aa25b90ebdfac53498ed917bee13a00.bin
Files
-
e156b217823113c33840ccc2b656eb4d.bin.zip
Password: infected
-
d6494e4de74639753cb61e5bca8cab807aa25b90ebdfac53498ed917bee13a00.bin.exe windows x86
Password: infected
5c0e4007f69c1e2127fbd8b35d9e1818
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenProcess
TerminateProcess
Process32Next
CreateToolhelp32Snapshot
GetVersionExA
GetComputerNameA
GlobalMemoryStatus
Sleep
SetFileAttributesA
GetLocalTime
LoadLibraryA
GetSystemTime
CreateProcessA
SetCurrentDirectoryA
GetModuleFileNameA
CreateThread
CreateFileA
WriteFile
ReadFile
CreateMailslotA
GetDriveTypeA
GlobalLock
Process32First
GetTickCount
SetEndOfFile
CreateFileW
GetTimeZoneInformation
WriteConsoleW
SetStdHandle
SetEnvironmentVariableA
CompareStringW
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetLocaleInfoW
LoadLibraryW
IsValidCodePage
EndUpdateResourceA
LoadLibraryExA
BeginUpdateResourceA
LockResource
UpdateResourceA
FreeLibrary
LoadResource
FreeResource
FindResourceA
CloseHandle
GetFileTime
SetFileTime
GlobalUnlock
OpenFile
GetOEMCP
GetACP
GetModuleFileNameW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetFilePointer
HeapCreate
GetFileType
GetStdHandle
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsGetValue
GetProcessHeap
TlsAlloc
HeapSize
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
GetCPInfo
MultiByteToWideChar
LCMapStringW
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
GetLastError
HeapFree
DeleteFileA
HeapAlloc
HeapReAlloc
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileExA
FindNextFileA
FindClose
GetProcAddress
GetModuleHandleW
ExitProcess
CreateDirectoryA
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
user32
SetWindowsHookExA
TranslateMessage
GetMessageA
GetDesktopWindow
DispatchMessageA
GetDC
GetWindowRect
MessageBoxA
UnhookWindowsHookEx
GetKeyState
GetWindowThreadProcessId
GetForegroundWindow
CallNextHookEx
GetWindowTextA
ReleaseDC
GetKeyboardLayout
OpenClipboard
GetClipboardData
CloseClipboard
gdi32
DeleteDC
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
GetPixel
BitBlt
advapi32
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
shell32
ShellExecuteA
ole32
CoUninitialize
CoInitializeEx
CoTaskMemFree
CoCreateInstance
oleaut32
VariantClear
VariantInit
shlwapi
PathFileExistsA
wininet
InternetGetConnectedState
InternetConnectA
InternetReadFile
HttpOpenRequestA
HttpSendRequestA
InternetOpenA
InternetCloseHandle
winmm
mciSendCommandA
mciSendStringA
wsock32
send
gethostbyname
closesocket
socket
htons
WSAStartup
connect
Sections
.text Size: 218KB - Virtual size: 217KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ