Static task
static1
Behavioral task
behavioral1
Sample
7aa6a3dccf29348a58a106ca27606d16e293cd0ec2fae10ec54c9041058d5907.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
7aa6a3dccf29348a58a106ca27606d16e293cd0ec2fae10ec54c9041058d5907.exe
Resource
win10v2004-20230703-en
General
-
Target
5adda548b167701522e79f1c56692d79.bin
-
Size
133KB
-
MD5
4aaee43a9d6bfc5564256207cf356a7d
-
SHA1
bb20a629da51a8854a5f7ff0f0b07e2652e78f70
-
SHA256
34f710fb637f0743d598a82a49265dc5b09ac3b2b3d74d60edc358143858ccd8
-
SHA512
57e0431ae168c4d36ffa089427a7af1333235db890a462a08ada1ed3e8154f0e7844208de64ce9195abe57ddf9c5f535424a7ed595b2aeb8c9471701dc10c9c2
-
SSDEEP
3072:7uC+XFnycFwdkIQhDpyWJPcPIYQS1c7UK:7urFnLFwdpMyCk2SpK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/7aa6a3dccf29348a58a106ca27606d16e293cd0ec2fae10ec54c9041058d5907.exe
Files
-
5adda548b167701522e79f1c56692d79.bin.zip
Password: infected
-
7aa6a3dccf29348a58a106ca27606d16e293cd0ec2fae10ec54c9041058d5907.exe.exe windows x86
Password: infected
9d608900baedff6c1407537712c386a4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetInformationJobObject
GetDriveTypeW
_llseek
EndUpdateResourceW
InterlockedIncrement
MoveFileExW
GetConsoleAliasA
InterlockedDecrement
QueryPerformanceCounter
CreateJobObjectW
GetProfileStringW
SetConsoleScreenBufferSize
GetTimeFormatA
OpenSemaphoreA
GetTickCount
GetNumberFormatA
GetConsoleAliasExesW
WaitNamedPipeW
GetDateFormatA
GetUserDefaultLangID
GetCommandLineA
GlobalAlloc
GetPrivateProfileIntA
SetFileShortNameW
LoadLibraryW
ReadConsoleInputA
_hread
GetCalendarInfoA
GetSystemWindowsDirectoryA
GetConsoleAliasExesLengthW
DeleteVolumeMountPointW
GetFileAttributesA
SetConsoleMode
GetWriteWatch
SetProcessAffinityMask
GetStartupInfoW
GetStartupInfoA
GetHandleInformation
GetCurrentDirectoryW
SetLastError
ReadConsoleOutputCharacterA
GetProcAddress
PeekConsoleInputW
MoveFileW
OpenWaitableTimerA
LoadLibraryA
OpenMutexA
InterlockedExchangeAdd
SetCalendarInfoW
GetFileType
BuildCommDCBAndTimeoutsW
AddVectoredExceptionHandler
SetConsoleCtrlHandler
AddAtomW
GlobalGetAtomNameW
FindNextFileA
GetModuleHandleA
FreeEnvironmentStringsW
FindNextFileW
CreateMailslotA
GetCurrentDirectoryA
EnumDateFormatsW
GetUserDefaultUILanguage
FindFirstVolumeA
GetWindowsDirectoryW
MoveFileWithProgressW
DebugBreak
EnumSystemLocalesW
DeleteFileA
GetCommandLineW
GetVolumeNameForVolumeMountPointA
lstrcatA
ExitProcess
GetLastError
MoveFileA
WideCharToMultiByte
HeapAlloc
HeapSetInformation
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
DecodePointer
TlsFree
GetModuleHandleW
GetCurrentThreadId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
EnterCriticalSection
LeaveCriticalSection
HeapFree
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringW
MultiByteToWideChar
GetStringTypeW
Sleep
IsProcessorFeaturePresent
RtlUnwind
HeapReAlloc
HeapSize
GetConsoleCP
GetConsoleMode
FlushFileBuffers
ReadFile
SetFilePointer
CloseHandle
WriteConsoleW
SetStdHandle
CreateFileW
RaiseException
gdi32
GetCharWidthA
GetTextFaceW
GetBoundsRect
Sections
.text Size: 107KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 76KB - Virtual size: 30.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cimepex Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ