Static task
static1
Behavioral task
behavioral1
Sample
2846e83998a7f2684baa16e23f3bc18e61742c1a5b2e70551a6172ad76f1679a.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
2846e83998a7f2684baa16e23f3bc18e61742c1a5b2e70551a6172ad76f1679a.exe
Resource
win10v2004-20231023-en
General
-
Target
dc6a65858077798b45f666e3521ef14e.bin
-
Size
20KB
-
MD5
b2e18edbf3af887f33441e472de88047
-
SHA1
018f2953dce4d8a24489796a796bd3ccf66b0da0
-
SHA256
c225d671104bd8e363ea9e20968c7dc3acf12dec163da2f583a22879db85c17b
-
SHA512
53cc13e227826be72a38c5a2781c3047859002448736da1608250bb998aba1a275c3bdd46e0cafe378c898df0f16b1cb4c173a59dd3dd2809376a78be67d49ea
-
SSDEEP
384:pAs71EYAf0LSunnUDSaMT1wn5yu2ZjYnN+1UMsPdI2qCTXmZSuU6d0VnvM3LA3P8:WsR5LSunU/5kZjss1DSdeOASuUMv3U30
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/2846e83998a7f2684baa16e23f3bc18e61742c1a5b2e70551a6172ad76f1679a.exe
Files
-
dc6a65858077798b45f666e3521ef14e.bin.zip
Password: infected
-
2846e83998a7f2684baa16e23f3bc18e61742c1a5b2e70551a6172ad76f1679a.exe.exe windows:4 windows x86
Password: infected
11d42e5a5770dd9f0e82bcca3b9cd23c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
InvertRect
GetClassLongW
MsgWaitForMultipleObjectsEx
ws2_32
getprotobyname
recvfrom
kernel32
HeapCreate
GetModuleHandleA
GetProcAddress
SetTapeParameters
LoadLibraryW
SetLocalTime
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
LoadLibraryA
InitializeCriticalSection
Sleep
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
RtlUnwind
HeapSize
MultiByteToWideChar
GetLocaleInfoA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
Sections
.text Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ