Static task
static1
Behavioral task
behavioral1
Sample
63727771d1206803f866476a28a3f52dc502d15daca58391344126179177efc0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
63727771d1206803f866476a28a3f52dc502d15daca58391344126179177efc0.exe
Resource
win10v2004-20230915-en
General
-
Target
63727771d1206803f866476a28a3f52dc502d15daca58391344126179177efc0.zip
-
Size
131KB
-
MD5
709e8034e5435b453a1ac16f90a8dd24
-
SHA1
1ac89e464f162ecf39a12a046493522568d76f93
-
SHA256
95d917890716e95ef648f493d975463e272a944ccb47a71054ee216409e6af0d
-
SHA512
0e26b0485ca207b6d587720c57cefc44dabcd7ad1e5d80d3d1a96fe8b16f812baf265316ef480d661e618395c3e5d18938e67774c9164492f8aaafb94e848a6f
-
SSDEEP
3072:+SPWoAfVWip7QjqTESV8CuUg9Pc6+F7qcHrEu2aeya:+SPHo/p8Hg2cHIX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/63727771d1206803f866476a28a3f52dc502d15daca58391344126179177efc0
Files
-
63727771d1206803f866476a28a3f52dc502d15daca58391344126179177efc0.zip.zip
Password: infected
-
63727771d1206803f866476a28a3f52dc502d15daca58391344126179177efc0.exe windows:5 windows x86
d9afe5e75e314d3837e02621276ac21d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
VirtualAlloc
GetModuleFileNameW
SetFilePointer
SetEndOfFile
FindClose
CreateFileW
GetVersionExW
Sleep
LoadLibraryA
GlobalAlloc
GetCurrentProcess
CloseHandle
GetCurrentDirectoryW
GetProcAddress
SetFilePointerEx
MoveFileExW
GetFileSize
ExitProcess
GetDriveTypeW
ReadConsoleW
WriteConsoleW
FindNextFileW
VirtualFree
GetFileSizeEx
FindFirstFileW
GetLogicalDrives
DeleteFileW
ReadFile
MultiByteToWideChar
WideCharToMultiByte
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
SetEvent
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RaiseException
RtlUnwind
GetLastError
FreeLibrary
LoadLibraryExW
HeapAlloc
HeapReAlloc
HeapFree
GetModuleHandleExW
GetModuleFileNameA
GetStdHandle
GetCommandLineA
GetCommandLineW
GetACP
WaitForSingleObject
GetExitCodeProcess
CreateProcessA
GetFileAttributesExW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
FlushFileBuffers
GetConsoleCP
GetConsoleMode
GetProcessHeap
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetStdHandle
HeapSize
user32
SendMessageW
advapi32
CryptAcquireContextW
CryptDecrypt
RegOpenKeyExA
CryptImportKey
RegDeleteValueA
CryptDestroyKey
Sections
.text Size: 172KB - Virtual size: 171KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ