Static task
static1
Behavioral task
behavioral1
Sample
485c21d79aa4cc9a46380df24f20f1a50d09ca5e47f37569153117a030a0d686.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
485c21d79aa4cc9a46380df24f20f1a50d09ca5e47f37569153117a030a0d686.exe
Resource
win10v2004-20230915-en
General
-
Target
d2926148cb8cb57db4e72c8153b15e6c.bin
-
Size
90KB
-
MD5
8aea24f78b718ec512664f655452d806
-
SHA1
7b8699189aa0cf768280d4d618bf9a1376106b2a
-
SHA256
b437e8c709c40c20c55098479597136dfc3589c4b8b175bbe19c6dfaa0925455
-
SHA512
21214012bb6c8f9a229bc184b63c5c0566c3498576f88ae768df1cd72dcf999f4827dad61901a34bb4ab4a6ccccf5440eb8ccf6d5b74f4db471959dc34679383
-
SSDEEP
1536:5wwkXYeTXmOjnXj8Ky4h4Mr8lou5L7eAQYYPvXqCtKKEv4u4KcpQmtR9s5+ULlGM:ZkXgqj8Kxh45ouB6vXUv4v79A+4l1+U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/485c21d79aa4cc9a46380df24f20f1a50d09ca5e47f37569153117a030a0d686.exe
Files
-
d2926148cb8cb57db4e72c8153b15e6c.bin.zip
Password: infected
-
485c21d79aa4cc9a46380df24f20f1a50d09ca5e47f37569153117a030a0d686.exe.exe windows:6 windows x86
d59b0e57881f633c6b260140733c6722
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
imm32
ImmEscapeA
ImmGetImeMenuItemsW
ImmReSizeIMCC
ImmUnregisterWordW
ImmSetCompositionWindow
ImmGetDescriptionA
ImmGetCompositionWindow
ImmIsUIMessageW
shlwapi
PathFindExtensionW
PathParseIconLocationA
PathStripPathA
UrlCompareW
PathCreateFromUrlA
PathRemoveBackslashW
ChrCmpIA
kernel32
CreateFileW
ReadConsoleW
WriteConsoleW
SetStdHandle
OutputDebugStringW
LoadLibraryExW
GetModuleHandleW
GetProcAddress
EnumTimeFormatsW
SetFilePointerEx
ReadFile
GetConsoleMode
GetConsoleCP
FlushFileBuffers
CloseHandle
HeapReAlloc
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
WriteFile
GetModuleFileNameW
GetFileType
GetStdHandle
IsDebuggerPresent
GetProcessHeap
GetCurrentThreadId
GetOEMCP
GetACP
IsValidCodePage
HeapSize
GetModuleHandleExW
ExitProcess
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
GetStringTypeW
GetLastError
HeapFree
RaiseException
RtlUnwind
GetCommandLineW
GetCPInfo
HeapAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
IsProcessorFeaturePresent
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
user32
EditWndProc
InvalidateRect
GetForegroundWindow
resutils
ResUtilSetExpandSzValue
ResUtilGetProperty
ResUtilGetDwordValue
ResUtilEnumResources
ResUtilVerifyPropertyTable
ResUtilIsPathValid
ResUtilStartResourceService
ResUtilEnumPrivateProperties
ResUtilDupParameterBlock
ResUtilEnumProperties
wsnmp32
ord104
ord200
ord201
ord203
ord601
oleaut32
VarI2FromI4
VarImp
VarR4FromR8
VarDiv
VarUI4FromUI1
SafeArrayRedim
Sections
.text Size: 120KB - Virtual size: 119KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.yak Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ