Static task
static1
Behavioral task
behavioral1
Sample
array.bin_00B90000.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
array.bin_00B90000.exe
Resource
win10v2004-20231023-en
General
-
Target
virus4.7z
-
Size
72KB
-
MD5
380d555e0c0986cb8ea34d952ee4e62b
-
SHA1
1cfae22f12ab95765f8892f03655b3ff63a8a60f
-
SHA256
d76127ce7110c4f9d2ef4c93e8e13d5c5d98a4cd321f0fc486235f9d8d3a8bd8
-
SHA512
7aaa072bcbbcabacb5a8d40555aab566183f3779b604d3cc8aef053513cc9b70185bb300ee7f6a8794f6357d2621830e22bd91e6b5e35262dbddc6ba357ffa40
-
SSDEEP
1536:r8bpBwSQE0WBa+4JJJBa3A2eVgo6nqBpCebQt0Q4RiVCFyNK93Ro:ruGSBTa+Wb2eVZcW5Q4RiQFyNio
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/array.bin_00B90000.bin
Files
-
virus4.7z.7z
Password: infected
-
array.bin_00B90000.bin.exe windows:6 windows x86
4778eaeec0af6ef601e5e73c6d1c99dc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
lstrlenA
lstrcpyA
GetProcessHeap
WriteFile
FindClose
GetFileAttributesA
CreateFileA
CloseHandle
MultiByteToWideChar
CreateDirectoryA
ReadFile
GetTempPathA
GetFileSize
HeapAlloc
MoveFileA
VirtualFree
Wow64DisableWow64FsRedirection
VirtualAlloc
Wow64EnableWow64FsRedirection
Sleep
GetLastError
DeleteFileA
ExitProcess
TerminateProcess
CreateProcessA
CreateFileW
DecodePointer
HeapSize
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
SetFilePointerEx
GetFileSizeEx
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
HeapReAlloc
LCMapStringW
WriteConsoleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
RtlUnwind
RaiseException
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetModuleHandleExW
GetStdHandle
GetModuleFileNameW
GetFileType
WideCharToMultiByte
user32
wsprintfA
shell32
ShellExecuteA
winhttp
WinHttpSendRequest
WinHttpOpenRequest
WinHttpSetTimeouts
WinHttpConnect
WinHttpQueryDataAvailable
WinHttpReadData
WinHttpReceiveResponse
WinHttpOpen
WinHttpCloseHandle
urlmon
URLDownloadToFileA
Sections
.text Size: 111KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ