Static task
static1
Behavioral task
behavioral1
Sample
c0d0665bc0fc83c9204e30057d7c626e80f3ebe1e0554f17930274aa11996ef1.exe
Resource
win10-20230703-en
General
-
Target
c0d0665bc0fc83c9204e30057d7c626e80f3ebe1e0554f17930274aa11996ef1.zip
-
Size
268KB
-
MD5
763b328dc5d8db277b404bc732adfb4c
-
SHA1
7c32b90ee1a08a5f2cc29d1693686bfee18b2cb1
-
SHA256
d7c3cfaac23beb9e2932d2caee9c9fd3cb1a7b792349b117522e887e15286471
-
SHA512
7ca7bfe4cb3a3805445ea8181d4daaf656802ae0215b412d33af8dce5a86a28c84c4a9c9b09d10e68baccc05b9546b5cd83adcb338f5f9a1d45e1dea586fe110
-
SSDEEP
6144:/rx4ZBKn0Ojg1BjLTD5NAKaxKmhMNVBjxqhh5C8uwzvhO9i7ddS9Y:2ZBy0OE1BjvFNAvhgBAbLzvhHLS9Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/c0d0665bc0fc83c9204e30057d7c626e80f3ebe1e0554f17930274aa11996ef1.exe
Files
-
c0d0665bc0fc83c9204e30057d7c626e80f3ebe1e0554f17930274aa11996ef1.zip.zip
Password: infected
-
c0d0665bc0fc83c9204e30057d7c626e80f3ebe1e0554f17930274aa11996ef1.exe.exe windows x86
Password: infected
90cfb770dd8b0646a46fc541c93185a2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
GetTickCount
GetVersionExA
FreeLibrary
GetProcAddress
GlobalMemoryStatus
LoadLibraryA
HeapAlloc
HeapFree
GetCommandLineA
HeapReAlloc
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
IsDebuggerPresent
GetModuleFileNameW
GetModuleHandleExW
WriteConsoleW
ReadFile
EncodePointer
DecodePointer
InterlockedDecrement
ExitProcess
AreFileApisANSI
MultiByteToWideChar
GetProcessHeap
SetLastError
InterlockedIncrement
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameA
GetEnvironmentStringsW
QueryPerformanceCounter
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
OutputDebugStringW
LoadLibraryExW
LoadLibraryW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
RtlUnwind
ReadConsoleW
SetFilePointer
SetFilePointerEx
SetStdHandle
GetStringTypeW
LCMapStringW
HeapSize
CreateFileW
SetEndOfFile
GetVersion
GetCurrentThreadId
GetLastError
GetFileType
GetStdHandle
Sleep
VirtualAlloc
CreateFileA
CloseHandle
FreeEnvironmentStringsW
WriteFile
user32
GetUserObjectInformationW
GetProcessWindowStation
wsprintfA
MessageBoxA
GetDesktopWindow
advapi32
ReportEventA
DeregisterEventSource
RegisterEventSourceA
Sections
.text Size: 205KB - Virtual size: 205KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 139KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ