Static task
static1
Behavioral task
behavioral1
Sample
7796075f1ef6325830eed5369b7e5930ca514b6f32d304d51434873fcb5031e0.exe
Resource
win7-20231023-en
General
-
Target
12485771584.zip
-
Size
213KB
-
MD5
b85e201d621cd0f8952dfc80f086ddfa
-
SHA1
a48fb2cd3ec1272e9030d3bb313999ecd008507f
-
SHA256
4f57c5cb377a82028eb6ac7fa328a06f914a43be7cb54977b9696461e67f4282
-
SHA512
5993e8f7c778cb8d94692f7d2c81e4eff4fd79ced50912ec8c9200215804afc8fb230f35b4077ac63cf83722967e4dba8188e8a61376ecb8d9051f836511df5e
-
SSDEEP
3072:qmA1BtSxdymP+IYVlRlrcaOMa3GwHVE9DIUYjzDUDFhFGPFle8gSvTMx+TzS8/:0XtSxTmljza3LK9EJj3skPFme7zS8/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/7796075f1ef6325830eed5369b7e5930ca514b6f32d304d51434873fcb5031e0
Files
-
12485771584.zip.zip
Password: infected
-
7796075f1ef6325830eed5369b7e5930ca514b6f32d304d51434873fcb5031e0.exe windows:5 windows x86
Password: infected
7973a61531c93981746e35cc3b7b0ae0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VerSetConditionMask
FlushConsoleInputBuffer
GetModuleHandleW
ReadConsoleW
GetWindowsDirectoryA
GetGeoInfoW
GetConsoleAliasExesW
FindResourceExA
LoadLibraryW
GetNamedPipeInfo
GetConsoleAliasW
GetDevicePowerState
IsBadStringPtrA
LCMapStringA
SetLastError
lstrcmpiA
GetProcAddress
VirtualAlloc
InterlockedIncrement
BuildCommDCBW
LoadLibraryA
OpenWaitableTimerW
LocalAlloc
DnsHostnameToComputerNameA
AddAtomW
CreateEventW
SetCommMask
FreeEnvironmentStringsW
VirtualProtect
GetConsoleCursorInfo
EndUpdateResourceA
CreateWaitableTimerA
GetConsoleProcessList
EnumCalendarInfoExA
LCMapStringW
GetStringTypeW
MultiByteToWideChar
CreateFiber
lstrlenA
HeapSize
SetPriorityClass
GetLastError
HeapFree
HeapAlloc
Sleep
ExitProcess
GetStartupInfoW
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
WriteFile
GetStdHandle
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
InterlockedDecrement
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleA
GetLocaleInfoA
WideCharToMultiByte
GetStringTypeA
user32
GetCaretPos
WindowFromDC
GetMenuInfo
GetCursorInfo
gdi32
GetCharWidthA
advapi32
BackupEventLogW
Sections
.text Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.huy Size: 1024B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.nisuje Size: 1024B - Virtual size: 723B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.yoxavob Size: 1024B - Virtual size: 963B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 166KB - Virtual size: 166KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ