Static task
static1
Behavioral task
behavioral1
Sample
3278d5d944d0773e22cda20c978ee86c6185a28f5a93facd0f3732a5ddc755d8.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
3278d5d944d0773e22cda20c978ee86c6185a28f5a93facd0f3732a5ddc755d8.exe
Resource
win10v2004-20230703-en
General
-
Target
3278d5d944d0773e22cda20c978ee86c6185a28f5a93facd0f3732a5ddc755d8 (1).zip
-
Size
523KB
-
MD5
f3344bd374dc575353b295c3e572fd5f
-
SHA1
e6cfe3d0a90f5fc92567a5194a1257dba1528340
-
SHA256
71fb8934c8403f3d029af24440087f1379bd7392958553db305b0f6a1bd14ade
-
SHA512
14df7b113cb965a35474e0ac00fa995c7799fb0e0544f4d218ab61d41d565668b89d73b9eb5449b5c98fcd90a04d12cd00f00555ebb8ddf18e8275659b0c3cec
-
SSDEEP
12288:BrwSUeFBjDJ9X9xdBm52FxX7upgG0l/q+fCHbnOXW7INO0:BcSUeBX9xv0gTJYOXWEO0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/3278d5d944d0773e22cda20c978ee86c6185a28f5a93facd0f3732a5ddc755d8.exe
Files
-
3278d5d944d0773e22cda20c978ee86c6185a28f5a93facd0f3732a5ddc755d8 (1).zip.zip
Password: infected
-
3278d5d944d0773e22cda20c978ee86c6185a28f5a93facd0f3732a5ddc755d8.exe.exe windows x64
Password: infected
30c7d46c36e7ac7e0d52b4514f420d27
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetProcessHeap
CreateFileA
CloseHandle
GetLastError
GetCurrentDirectoryA
GetCurrentActCtx
HeapWalk
CreateThread
FindFirstFileA
FindNextFileA
ReadFile
GetFileInformationByHandle
SetEndOfFile
SetFilePointer
CreateFileMappingA
ExitProcess
VirtualAlloc
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
WriteConsoleW
HeapFree
GetModuleHandleW
GetProcAddress
HeapAlloc
MultiByteToWideChar
WideCharToMultiByte
SetLastError
GetACP
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
CreateFileW
GetStringTypeW
GetCPInfo
InitializeCriticalSectionAndSpinCount
TlsGetValue
TlsSetValue
FreeLibrary
LoadLibraryExW
LCMapStringW
IsValidCodePage
GetOEMCP
GetModuleHandleExW
RaiseException
RtlUnwindEx
SetStdHandle
WriteFile
GetConsoleCP
GetConsoleMode
SetFilePointerEx
FlushFileBuffers
Sections
.text Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 446KB - Virtual size: 446KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 264KB - Virtual size: 267KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ