Static task
static1
Behavioral task
behavioral1
Sample
808b9cff96c4777439f0e8e8fe1be539ab290fcd7e1587d51d151cbe162231e6.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
808b9cff96c4777439f0e8e8fe1be539ab290fcd7e1587d51d151cbe162231e6.exe
Resource
win10v2004-20230915-en
General
-
Target
ae0e84b1c471528048ec59658ed69bf7.bin
-
Size
516KB
-
MD5
836612312e1404de224bb6b1397bef0f
-
SHA1
973bb02715f7046a125752731f5054a2395cdc72
-
SHA256
4ac6e9061097d8ec0a24b948097f9f2cc2ce4671a9e01d5f2047dfa5e77d08bd
-
SHA512
a857e3abfe898659f091c3690bd6dfc6be8528f00f678c175c3fbba0145506129215121b9129bd6f382a8cf5cad105c3e5b49bc3b08361ce87a6d56017802e2d
-
SSDEEP
12288:MEgDw6X+fFSF+AHBUWMGZ6aeeONhhB4KbNq+5fZobfU:4X+U2WB6aDAhXVfSM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/808b9cff96c4777439f0e8e8fe1be539ab290fcd7e1587d51d151cbe162231e6.exe
Files
-
ae0e84b1c471528048ec59658ed69bf7.bin.zip
Password: infected
-
808b9cff96c4777439f0e8e8fe1be539ab290fcd7e1587d51d151cbe162231e6.exe.exe windows:5 windows x86
5b554c388a3c865e206967d272cdc3f7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
WriteConsoleInputW
ReadConsoleInputA
GetSystemDirectoryA
WriteConsoleW
WaitNamedPipeA
BuildCommDCBA
InterlockedDecrement
BeginUpdateResourceW
CancelTimerQueueTimer
GetCPInfoExW
GetConsoleAliasExesLengthW
EnumTimeFormatsA
CopyFileA
ReadConsoleOutputCharacterW
GetConsoleAliasesLengthA
GlobalAlloc
GetProcAddress
GetModuleHandleW
GetUserDefaultLCID
UnhandledExceptionFilter
GetSystemWindowsDirectoryA
SizeofResource
EndUpdateResourceA
WritePrivateProfileStringA
EnumResourceNamesW
GlobalReAlloc
SetFileAttributesW
AreFileApisANSI
GetCurrentDirectoryW
GetAtomNameA
GetFileAttributesA
SetConsoleTitleW
VerSetConditionMask
SetProcessWorkingSetSize
GetLongPathNameW
GetLastError
GetSystemDefaultLangID
GetConsoleProcessList
PurgeComm
BuildCommDCBAndTimeoutsA
OpenJobObjectA
InitializeCriticalSectionAndSpinCount
FindResourceExA
EnumCalendarInfoExW
GetConsoleMode
GetDiskFreeSpaceA
GetConsoleAliasExesW
GlobalMemoryStatusEx
ReadConsoleOutputAttribute
CreateFileW
LoadLibraryW
CancelWaitableTimer
HeapReAlloc
HeapFree
HeapAlloc
EncodePointer
DecodePointer
RtlUnwind
GetCommandLineW
HeapSetInformation
GetStartupInfoW
IsProcessorFeaturePresent
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
SetFilePointer
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
EnterCriticalSection
LeaveCriticalSection
HeapCreate
ExitProcess
WriteFile
GetModuleFileNameW
Sleep
HeapSize
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
WideCharToMultiByte
GetConsoleCP
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RaiseException
SetStdHandle
LCMapStringW
MultiByteToWideChar
GetStringTypeW
ReadFile
FlushFileBuffers
CloseHandle
user32
ClientToScreen
advapi32
AreAllAccessesGranted
winhttp
WinHttpCloseHandle
Sections
.text Size: 190KB - Virtual size: 189KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 465KB - Virtual size: 40.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.wohorac Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4.7MB - Virtual size: 4.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ