FreeInterface
Static task
static1
Behavioral task
behavioral1
Sample
7fc9e830756e23aa4b050f4ceaeb2a83cd71cfc0145392a0bc03037af373066b.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
7fc9e830756e23aa4b050f4ceaeb2a83cd71cfc0145392a0bc03037af373066b.dll
Resource
win10v2004-20230915-en
General
-
Target
5e1389b494edc86e17ff1783ed6b9d37.bin
-
Size
9KB
-
MD5
1ba615b73e54ad3710dd94a36b91a698
-
SHA1
041c3ea89baca3bb455f2c714adcf451b6e36bd0
-
SHA256
049bc6a9d130d137c946e632906cfd98a63718358a5b11405913113ebd57726b
-
SHA512
44b51cbb3a4a0ebf299e65d028bde72f810a3e6226dc70bfacd80731f78f42feb9d19782e8f238499ff45656b0cfacaf2f2dfc6a1fc9a0dc4991b0994456edff
-
SSDEEP
192:+casDMPUkXOB7nwM8deHXGEmOenuQZFzPRurRxLlZSCVtr0GpDenOl:NasDMPlOB7nwM/HW1/RGxLlBdCOl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/7fc9e830756e23aa4b050f4ceaeb2a83cd71cfc0145392a0bc03037af373066b.exe
Files
-
5e1389b494edc86e17ff1783ed6b9d37.bin.zip
Password: infected
-
7fc9e830756e23aa4b050f4ceaeb2a83cd71cfc0145392a0bc03037af373066b.exe.dll windows:4 windows x64
2b9a9ff9b5e9b958fab3ee0fedf54541
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
Imports
advapi32
GetUserNameA
kernel32
ConvertThreadToFiber
CreateFiber
CreateToolhelp32Snapshot
DeleteCriticalSection
EnterCriticalSection
GetComputerNameExA
GetLastError
GetProcessHeap
HeapAlloc
HeapFree
InitializeCriticalSection
LeaveCriticalSection
MultiByteToWideChar
Process32First
Process32Next
Sleep
SwitchToFiber
TlsGetValue
VirtualProtect
VirtualQuery
msvcrt
__iob_func
_amsg_exit
_initterm
_lock
_unlock
abort
calloc
free
fwrite
memcmp
realloc
strlen
strncmp
vfprintf
Exports
Exports
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 1024B - Virtual size: 1020B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 1024B - Virtual size: 816B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 63KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 79B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 88B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 96B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ