Static task
static1
Behavioral task
behavioral1
Sample
b3660d5b89325da2898e2ae7efe2b19c1f0442039f4ca76ad7b9876368b5fe99.exe
Resource
win7-20230712-en
General
-
Target
6f0cb4fc92654a60a89857ac06e76901.bin
-
Size
160KB
-
MD5
f9156152120d5d9e8cf1c4548a504ba0
-
SHA1
9a3c502fb4d36080ce02434321c290827dc8eee6
-
SHA256
c3336f087d51341e74d7756c8b540cbea076d4700877403efcfce33ae697564f
-
SHA512
a191664d94910ba554a7b143a0b2da598c2358218b8d15a0b97ed0e50134d6512e16190a1824d5fe7d1dd017a0b54c534dcbfaf2b9172c5fa42d184615bc112c
-
SSDEEP
3072:IE9rcjyQ9E6xuBqSVUyYz4FiJRIOO6aDad2bKAHMcYoE8Tjl6j/SGTVUa:IOwE6YMS4z4FGqOZ2bhM9eMj/9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/b3660d5b89325da2898e2ae7efe2b19c1f0442039f4ca76ad7b9876368b5fe99.exe
Files
-
6f0cb4fc92654a60a89857ac06e76901.bin.zip
Password: infected
-
b3660d5b89325da2898e2ae7efe2b19c1f0442039f4ca76ad7b9876368b5fe99.exe.exe windows x86
Password: infected
ea5c91886d318a6fa141ca03c663eea4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EndUpdateResourceW
OpenJobObjectA
GetConsoleAliasA
InterlockedDecrement
GetCurrentProcess
GetSystemWindowsDirectoryW
SetHandleInformation
GetProfileStringW
GetTimeFormatA
OpenSemaphoreA
GetSystemDefaultLCID
FreeEnvironmentStringsA
GetModuleHandleW
GetTickCount
GetNumberFormatA
GetWindowsDirectoryA
WaitNamedPipeW
EnumTimeFormatsA
GetCommandLineA
GlobalAlloc
LoadLibraryW
GetConsoleMode
ReadConsoleInputA
DeleteVolumeMountPointW
GetFileAttributesA
GetExitCodeProcess
SetConsoleCursorPosition
lstrcatA
GetStartupInfoW
CreateJobObjectA
EnumSystemLocalesA
GetPrivateProfileIntW
BuildCommDCBAndTimeoutsA
GetCurrentDirectoryW
SetLastError
GetProcAddress
MoveFileW
FindClose
OpenWaitableTimerA
LoadLibraryA
OpenMutexA
InterlockedExchangeAdd
GetFileType
MoveFileA
GlobalGetAtomNameW
GetPrivateProfileSectionNamesA
EnumDateFormatsA
GetModuleHandleA
FreeEnvironmentStringsW
FindNextFileW
CreateMailslotA
EnumDateFormatsW
PeekConsoleInputA
SetCalendarInfoA
OpenSemaphoreW
SetFileShortNameA
FindFirstVolumeW
GetVolumeNameForVolumeMountPointW
DebugBreak
ResetWriteWatch
ReadConsoleOutputCharacterW
DeleteFileA
GetSystemDefaultLangID
GetConsoleAliasExesLengthA
MoveFileExA
GetConsoleAliasExesA
GetStartupInfoA
WideCharToMultiByte
InterlockedIncrement
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
GetStringTypeW
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
HeapFree
HeapAlloc
GetCommandLineW
HeapSetInformation
GetCPInfo
RaiseException
RtlUnwind
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
HeapCreate
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoW
IsProcessorFeaturePresent
HeapSize
GetUserDefaultLCID
GetLocaleInfoA
IsValidLocale
HeapReAlloc
SetFilePointer
GetConsoleCP
SetStdHandle
WriteConsoleW
FlushFileBuffers
ReadFile
CreateFileW
CloseHandle
gdi32
GetCharABCWidthsW
GetCharWidthW
GetTextFaceA
SelectPalette
Sections
.text Size: 150KB - Virtual size: 150KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 91KB - Virtual size: 30.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lagijol Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 66KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ