Static task
static1
Behavioral task
behavioral1
Sample
34371928b08dbffed7258071a899cd4e59b57a69db04518117dfdc3d5df33cf2.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
34371928b08dbffed7258071a899cd4e59b57a69db04518117dfdc3d5df33cf2.exe
Resource
win10v2004-20230703-en
General
-
Target
91050afce2057c075b009ae464326dfb.bin
-
Size
132KB
-
MD5
4b1039c5b3eed2f981a4fc1a124f5a7f
-
SHA1
3e9614e0e74233304c896b852938cc47dd89e427
-
SHA256
f442a3fbf872819d2abb973437afb6e74b0ae3f100073d6087bd34f7cfc9db12
-
SHA512
c559dbbb416e0347b75c8c78ee73089f3cb59f2253b92e6a1f06005463d5713fc83b49882edac2c55b5af654bfe52589b3e82a5b795e2b155ff4791cf4d47084
-
SSDEEP
3072:tIkJ28SoG7SXrIgoMmwOLNp5/IwLWL9o6zH8HFWRZAPSTo/mqeVoNrqu1zl5m:tU8So5loMmwigwy9o6Dg0AaTIAGeu75m
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/34371928b08dbffed7258071a899cd4e59b57a69db04518117dfdc3d5df33cf2.exe
Files
-
91050afce2057c075b009ae464326dfb.bin.zip
Password: infected
-
34371928b08dbffed7258071a899cd4e59b57a69db04518117dfdc3d5df33cf2.exe.exe windows x86
Password: infected
e22d1ddd8438f247ac07b74fc5ce87b3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeW
_llseek
GetConsoleAliasExesLengthA
DeleteVolumeMountPointA
EndUpdateResourceW
InterlockedIncrement
GetConsoleAliasA
InterlockedDecrement
QueryPerformanceCounter
CreateJobObjectW
GetProfileStringW
GetTimeFormatA
OpenSemaphoreA
FreeEnvironmentStringsA
GetTickCount
GetNumberFormatA
GetConsoleAliasExesW
WaitNamedPipeW
GetUserDefaultLangID
GetCommandLineA
GetConsoleCP
GlobalAlloc
LoadLibraryW
ReadConsoleInputA
_hread
GetCalendarInfoW
GetSystemWindowsDirectoryA
GetFileAttributesA
GetExitCodeProcess
SetConsoleMode
GetWriteWatch
SetConsoleCursorPosition
lstrcatA
GetPrivateProfileIntW
SetInformationJobObject
OpenMutexW
GetHandleInformation
SetLastError
ReadConsoleOutputCharacterA
GetProcAddress
PeekConsoleInputW
MoveFileW
OpenWaitableTimerA
LoadLibraryA
InterlockedExchangeAdd
SetCalendarInfoW
GetFileType
MoveFileA
BuildCommDCBAndTimeoutsW
AddVectoredExceptionHandler
SetConsoleCtrlHandler
AddAtomW
GlobalGetAtomNameW
FindNextFileA
GetModuleHandleA
FreeEnvironmentStringsW
CreateMailslotA
GetCurrentDirectoryA
EnumDateFormatsW
GetUserDefaultUILanguage
SetThreadAffinityMask
SetFileShortNameA
GetWindowsDirectoryW
FindFirstVolumeW
GetCurrentProcessId
DebugBreak
EnumSystemLocalesW
DeleteFileA
SetProcessAffinityMask
GetDateFormatW
GetStartupInfoA
GetVolumeNameForVolumeMountPointA
GetLastError
WideCharToMultiByte
HeapAlloc
GetCommandLineW
HeapSetInformation
GetStartupInfoW
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
DecodePointer
TlsFree
GetModuleHandleW
GetCurrentThreadId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
EnterCriticalSection
LeaveCriticalSection
HeapFree
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetSystemTimeAsFileTime
LCMapStringW
MultiByteToWideChar
GetStringTypeW
Sleep
IsProcessorFeaturePresent
RtlUnwind
HeapReAlloc
HeapSize
GetConsoleMode
FlushFileBuffers
ReadFile
SetFilePointer
CloseHandle
WriteConsoleW
SetStdHandle
CreateFileW
RaiseException
gdi32
GetBoundsRect
GetCharWidthA
GetTextFaceA
Sections
.text Size: 107KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 76KB - Virtual size: 30.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xigukuz Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ