Behavioral task
behavioral1
Sample
d2bdbe121774d186eaab95260beb2f8c5dc831464f1456cb57a7ce4a6239b8fc.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
d2bdbe121774d186eaab95260beb2f8c5dc831464f1456cb57a7ce4a6239b8fc.exe
Resource
win10v2004-20231020-en
General
-
Target
3571a9e7cc832331f0f914f9b5e6de0c.bin
-
Size
8.4MB
-
MD5
be17d1cf34ee3ff58be778eaab9be5bf
-
SHA1
ad7b586999481b2093b327f476201268482dd4dc
-
SHA256
c0bb9fc741a9dcfeb15625eb99800f88843fd13dcbe69bcbccfaaf582351047c
-
SHA512
f1efb42a7e64499deecd1dc238918dd781965c644ef04f5525fab892a5c630e5189848d777d35bd506f9f3436d7bca89a0f9ab5006b1e4864c20e930281e3eeb
-
SSDEEP
196608:6OR4GqwyEpuHfgYubF9iwtT0nVYllffRBhpz63Sj:6OR+OuFub3iwtT0ClBfRBYSj
Malware Config
Signatures
-
resource yara_rule static1/unpack001/d2bdbe121774d186eaab95260beb2f8c5dc831464f1456cb57a7ce4a6239b8fc.exe upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/d2bdbe121774d186eaab95260beb2f8c5dc831464f1456cb57a7ce4a6239b8fc.exe
Files
-
3571a9e7cc832331f0f914f9b5e6de0c.bin.zip
Password: infected
-
d2bdbe121774d186eaab95260beb2f8c5dc831464f1456cb57a7ce4a6239b8fc.exe.exe windows:6 windows x64
Password: infected
62c66ff7dcda8f634504d4a495a0d2d3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetTempPathW
GetSystemTimeAsFileTime
LocalAlloc
LocalFree
GetModuleFileNameW
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
SendMessageW
CharUpperBuffW
gdi32
DeleteDC
advapi32
SetFileSecurityA
shell32
SHGetKnownFolderPath
ole32
GetHGlobalFromStream
iphlpapi
GetAdaptersAddresses
shlwapi
SHDeleteKeyW
dbghelp
ImageDirectoryEntryToData
ntdll
RtlVirtualUnwind
ws2_32
send
gdiplus
GdipSaveImageToStream
Sections
.text Size: 512KB - Virtual size: 511KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sdata Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX0 Size: 5.3MB - Virtual size: 5.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 955B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ