Static task
static1
Behavioral task
behavioral1
Sample
d1fed66d27d286a11db1fd71bcf06d6a33b92490e53a8dcecf5d80d98a9c15a2.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d1fed66d27d286a11db1fd71bcf06d6a33b92490e53a8dcecf5d80d98a9c15a2.exe
Resource
win10v2004-20230915-en
General
-
Target
658d67cf9146dcd52f7d913987d654c4.bin
-
Size
48KB
-
MD5
3cbb376a3dbe04c76676d1ff81568c07
-
SHA1
4764c13b551a969e85843cc0dc6d1abacff9b960
-
SHA256
bfdc3104d26c3df2531b45045989c55578663380435c5c14348dd7c34a8620fe
-
SHA512
afe6309ab47239d9787026ace808047e603b591d42ba392b5d4c0679fcfbcc1a9b6f3e9ef80ea6e6870e48d37ce1410f656a2a3e52c9f62008a501ae2ac90013
-
SSDEEP
1536:MQSWMZywovLhRf5n7H7RNa8F+0aLFZX888BBG+YQH:9BxDhd57H7GeLaZF8LBI+YQH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/d1fed66d27d286a11db1fd71bcf06d6a33b92490e53a8dcecf5d80d98a9c15a2.bin
Files
-
658d67cf9146dcd52f7d913987d654c4.bin.zip
Password: infected
-
d1fed66d27d286a11db1fd71bcf06d6a33b92490e53a8dcecf5d80d98a9c15a2.bin.exe windows:10 windows x64
Password: infected
f687361df7bdca2d5ef9c85507d7f3ea
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
MultiByteToWideChar
ReadFile
GetFileSize
SetFilePointer
WriteFile
GetFileAttributesW
CreateFileW
LoadLibraryW
WideCharToMultiByte
SetThreadPreferredUILanguages
GetTempPath2W
GetTempFileNameW
CopyFileW
GetModuleHandleW
LocalFree
DeleteFileW
GetLastError
LocalAlloc
GetConsoleOutputCP
Sleep
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
GetModuleHandleExA
GetProcAddress
FreeLibrary
CloseHandle
SystemTimeToFileTime
GetSystemTime
GetACP
ExpandEnvironmentStringsW
CompareStringOrdinal
msvcrt
_cexit
_exit
exit
__set_app_type
__wgetmainargs
_amsg_exit
_XcptFilter
memmove
memcpy
__CxxFrameHandler3
_CxxThrowException
_initterm
_fmode
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@AEBQEBDH@Z
??0exception@@QEAA@AEBQEBD@Z
wcstol
_commode
_lock
_unlock
__dllonexit
_onexit
setlocale
?what@exception@@UEBAPEBDXZ
__C_specific_handler
free
wcstombs_s
_wcsicmp
_vsnwprintf
__iob_func
??1type_info@@UEAA@XZ
?terminate@@YAXXZ
??1exception@@UEAA@XZ
toupper
_wcslwr_s
towlower
wcscat_s
wcstok_s
__setusermatherr
??3@YAXPEAX@Z
_purecall
_callnewh
malloc
fwprintf
towupper
_wsetlocale
swprintf_s
iswxdigit
iswdigit
fputws
fclose
_wfopen_s
memset
user32
LoadStringW
shlwapi
StrCmpW
ntdll
RtlLookupFunctionEntry
RtlVirtualUnwind
RtlCaptureContext
normaliz
IdnToAscii
iphlpapi
ParseNetworkString
advapi32
RegQueryValueExW
IsTextUnicode
RegEnumKeyExW
RegDeleteValueW
RegSetValueExW
RegCreateKeyExW
RegEnumValueW
RegCloseKey
RegOpenKeyExW
EventActivityIdControl
TraceMessage
crypt32
CertFreeCertificateContext
CryptDecodeObject
CertGetCertificateChain
CertGetEnhancedKeyUsage
CertCloseStore
CertFreeCertificateChain
CertFindCertificateInStore
CertOpenStore
CertGetCertificateContextProperty
CertFindExtension
CryptBinaryToStringW
CryptMsgClose
CryptMsgUpdate
CryptMsgOpenToDecode
CertVerifyCertificateChainPolicy
CryptVerifyDetachedMessageSignature
CryptSignMessage
CertDuplicateCertificateChain
CertDuplicateCertificateContext
CryptStringToBinaryW
Sections
.text Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ