Static task
static1
Behavioral task
behavioral1
Sample
0673340c073807f7c2ee01a3b7c03c20419549480149320a2b1fa60f12ddeeb1.exe
Resource
win7-20230824-en
General
-
Target
11643516401.zip
-
Size
137KB
-
MD5
fd7d5a2b65ae4b2aaa9537fd8f9a723a
-
SHA1
c3511c24476b024fbe003d0fc1718f2aaf7710bc
-
SHA256
4b4d10885e991b899ca99200bfe45106ac8080f39eb93462e9544d4c9347a810
-
SHA512
0ece7dc38aa28fdd3d34658d5059125848c9e116c99f59e346b0c662918fd61039e1fb809f3a288ef3e24a97667ab09069e627d9a1dc1b9949214f83fff48f96
-
SSDEEP
3072:BeK8rPXz/ZhOdl7jrhgZBSvhQsZRcqe81t5xqIrVmr7tVZZrp8lnjn4a/:0dXz/fOLFgXWbIq5/rsr7t9p8ZP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/0673340c073807f7c2ee01a3b7c03c20419549480149320a2b1fa60f12ddeeb1
Files
-
11643516401.zip.zip
Password: infected
-
0673340c073807f7c2ee01a3b7c03c20419549480149320a2b1fa60f12ddeeb1.exe windows x86
Password: infected
30b62189dd33bea0f552414113e8b2af
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
FindActCtxSectionStringW
WriteConsoleInputW
ClearCommError
WriteFile
FindFirstVolumeMountPointW
CreateDirectoryExW
LocalSize
WaitForMultipleObjects
ReadConsoleInputA
FindNextVolumeMountPointA
OpenWaitableTimerW
VerifyVersionInfoW
GetVersionExA
GetProcessId
OpenEventA
WriteConsoleOutputAttribute
GetLocaleInfoW
GetProcAddress
LocalAlloc
GetCommandLineW
GetBinaryTypeA
InterlockedDecrement
OpenMutexA
GetConsoleTitleA
SearchPathA
FindResourceA
FreeConsole
UpdateResourceA
GetLastError
GetProfileSectionW
SetConsoleCursorInfo
RequestWakeupLatency
WritePrivateProfileSectionA
GlobalFlags
GetConsoleAliasesLengthW
DeleteVolumeMountPointW
FindResourceW
SetVolumeMountPointW
GetModuleHandleW
HeapAlloc
GetLocaleInfoA
GetComputerNameA
GetCurrentProcessId
CreateNamedPipeA
EnumResourceLanguagesW
SetHandleInformation
_hwrite
CreateActCtxA
DeleteVolumeMountPointA
ReleaseActCtx
WritePrivateProfileStringA
GetUserDefaultLangID
CreateMemoryResourceNotification
WaitForSingleObject
GetLongPathNameW
VerifyVersionInfoA
EnumCalendarInfoA
FindNextFileA
EnumTimeFormatsW
SetLastError
SetCriticalSectionSpinCount
GetConsoleAliasW
LoadLibraryA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
RtlUnwind
HeapFree
DeleteFileA
GetStartupInfoW
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
Sleep
ExitProcess
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
InitializeCriticalSectionAndSpinCount
WideCharToMultiByte
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
CloseHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
user32
GetComboBoxInfo
advapi32
RevertToSelf
Sections
.text Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 77KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ