Static task
static1
Behavioral task
behavioral1
Sample
88a3d1951e1b428b52e135df3c9795af521310780810633c25ce3768220a4101.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
88a3d1951e1b428b52e135df3c9795af521310780810633c25ce3768220a4101.exe
Resource
win10v2004-20230703-en
General
-
Target
9638ef1b9ee1c9116ebb9e4fe75db633.bin
-
Size
168KB
-
MD5
0affc4fcbbc91e110f686eec4eb248c3
-
SHA1
42e8bc681e96d2e5a51817f067b3e3f5f4703d94
-
SHA256
dd64e862eb631b0aa3e40a0b00745f697c7f8e94a5e9923d98d895eadd198376
-
SHA512
5525d8c9b7db76570083f040c648994833ca684c1c18b08f2013b3257150f1eb4326ef0e6327fe107273a5aa6edbe9c5fcdee6983f137d9dbbdd044d1f81d0c1
-
SSDEEP
3072:Xi1/mUZ8pRFETpBm8lvKlA/zn6U8R+7jgxayCSwhjghddpYmygF/q5t:XmOUZYuXm8pvbn9cxayCSdjpYhgFS5t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/88a3d1951e1b428b52e135df3c9795af521310780810633c25ce3768220a4101.bin
Files
-
9638ef1b9ee1c9116ebb9e4fe75db633.bin.zip
Password: infected
-
88a3d1951e1b428b52e135df3c9795af521310780810633c25ce3768220a4101.bin.exe windows x86
Password: infected
c2eb4b081374360af12e67500b753fd6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
sndPlaySoundA
kernel32
CreateFileW
ReadConsoleW
ReadFile
SetFilePointerEx
GetFileSizeEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
HeapReAlloc
HeapSize
SetConsoleCtrlHandler
GetProcessHeap
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
CloseHandle
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
GetStringTypeW
GetFileType
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
WritePrivateProfileStringA
GetPrivateProfileStringA
FindResourceA
lstrlenA
lstrcpyA
lstrcmpiA
LocalAlloc
LockResource
LoadResource
FreeResource
FreeLibrary
GetTickCount
WriteConsoleW
EnumSystemLocalesW
GetCurrentThreadId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
DecodePointer
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
InterlockedPushEntrySList
InterlockedFlushSList
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetProcAddress
LoadLibraryExW
EncodePointer
RaiseException
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
GetCurrentThread
OutputDebugStringW
HeapAlloc
HeapFree
FindClose
FindFirstFileExW
FindNextFileW
user32
LoadIconA
LoadCursorA
LoadBitmapA
FindWindowA
FrameRect
FillRect
MessageBoxA
GetClientRect
SetWindowTextA
InvalidateRect
EndPaint
BeginPaint
ReleaseDC
GetDC
UpdateWindow
KillTimer
SetTimer
LoadStringA
IsIconic
SetWindowPos
MoveWindow
OpenIcon
ShowWindow
DestroyWindow
CreateWindowExA
RegisterClassA
PostQuitMessage
DefWindowProcA
DispatchMessageA
TranslateMessage
GetMessageA
wsprintfA
SetFocus
gdi32
TextOutA
GetObjectA
GetTextMetricsA
SelectObject
PatBlt
GetTextExtentPoint32A
GetStockObject
GetDeviceCaps
DeleteObject
DeleteDC
CreateCompatibleDC
CreateCompatibleBitmap
CreateBitmap
BitBlt
Sections
.text Size: 278KB - Virtual size: 278KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ