Static task
static1
Behavioral task
behavioral1
Sample
decrypted_log.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
decrypted_log.exe
Resource
win10v2004-20230703-en
General
-
Target
decrypted_log.txt
-
Size
1.7MB
-
MD5
58ebb753721af7f6dbee488cdce84de4
-
SHA1
dc42990bba4ff1ee036c3370a7e4d9142b3ae70f
-
SHA256
16aa44e57ad5ef7b99be30c1f95282e33707cc757389ae956a5dea1d14291200
-
SHA512
12707290f4ce53911d856e3d53785870800487aacafaacade759c52b5810349a1aca403d303ce6b74aecda5b0ddd340d8520c60b581b0bd2e2748da0eb85b215
-
SSDEEP
24576:N/YPWBfUjCY+pcTfTKQuhH1Ca8DMVIEiRNbVCY3wsSgtnLxiiCaHir7F8IVvv8iq:NgPQUutO1QIbhQO9NsMHirhH4SaiKN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource decrypted_log.txt
Files
-
decrypted_log.txt.exe windows x86
d49e88090a89ea2162f06bb4ce4c5826
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteCriticalSection
ResetEvent
CreateThread
CancelIo
InterlockedExchange
SetEvent
EnterCriticalSection
LeaveCriticalSection
Sleep
DeleteFileA
LoadLibraryA
GetProcAddress
FreeLibrary
CreateFileA
WriteFile
ExpandEnvironmentStringsA
lstrcatA
lstrcpyA
CreateProcessA
GetTempPathA
GetTickCount
GlobalAlloc
GlobalLock
GlobalUnlock
VirtualProtect
HeapAlloc
GetProcessHeap
HeapFree
GetComputerNameA
CloseHandle
InterlockedDecrement
OutputDebugStringA
CreateMutexA
GetLastError
CreateToolhelp32Snapshot
Process32First
lstrcmpiA
Process32Next
GetFileAttributesA
GetCurrentThreadId
TerminateProcess
GetModuleFileNameA
SetLastError
GetModuleHandleW
InterlockedIncrement
LocalFree
SetEnvironmentVariableA
CompareStringW
GetStringTypeW
MultiByteToWideChar
WaitForSingleObject
CreateEventA
InitializeCriticalSection
VirtualAlloc
lstrlenA
VirtualFree
LCMapStringW
LoadLibraryW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlUnwind
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoW
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameW
GetStdHandle
GetTimeZoneInformation
WideCharToMultiByte
HeapCreate
ExitProcess
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
HeapReAlloc
ExitThread
GetCommandLineA
HeapSetInformation
RaiseException
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapSize
user32
GetLastInputInfo
GetClipboardData
SetClipboardData
EmptyClipboard
OpenClipboard
ExitWindowsEx
wsprintfA
CloseClipboard
advapi32
CloseEventLog
ClearEventLogA
OpenEventLogA
shell32
ShellExecuteA
ole32
CoSetProxyBlanket
CoInitializeEx
CoInitializeSecurity
CoUninitialize
CoCreateInstance
oleaut32
VariantClear
SysFreeString
SysAllocString
ws2_32
WSACleanup
socket
gethostbyname
htons
connect
getsockname
inet_ntoa
setsockopt
WSAIoctl
select
recv
closesocket
send
gethostname
inet_addr
WSAStartup
Sections
.text Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text0 Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ