Static task
static1
Behavioral task
behavioral1
Sample
03cc3806d0bf72812bbb1fb958aa0ac74ab437bb1194072cc997c8f34432d6fc.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
03cc3806d0bf72812bbb1fb958aa0ac74ab437bb1194072cc997c8f34432d6fc.exe
Resource
win10v2004-20231023-en
General
-
Target
03cc3806d0bf72812bbb1fb958aa0ac74ab437bb1194072cc997c8f34432d6fc.exe.zip
-
Size
81KB
-
MD5
42710968ba97ec7997fb093d6e4b3a91
-
SHA1
a4e0d753a0d61dce9a886b39be3ce7f75a6e735e
-
SHA256
e72d403c45d2a3767fd82e07e6da19b1d0e9de8d9caf399ccb42870b19cb0ac8
-
SHA512
576b8bcbbb5f17876d63fb70feb0b1db9b40b266eff8df7082e0327126ca768631d8dc9a34d82d96521e268f78c33eb2d6ee794ff46c7aaa7d8f9c987d605f3f
-
SSDEEP
1536:1dx4GHqxSxGj3s4IJTbk2UzDYKOjF3d2DOV5CmkQqf4bEs3HEP:1dxPK8k3sJr60R3dY+CRjf4dkP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/03cc3806d0bf72812bbb1fb958aa0ac74ab437bb1194072cc997c8f34432d6fc.exe
Files
-
03cc3806d0bf72812bbb1fb958aa0ac74ab437bb1194072cc997c8f34432d6fc.exe.zip.zip
Password: infected
-
03cc3806d0bf72812bbb1fb958aa0ac74ab437bb1194072cc997c8f34432d6fc.exe.exe windows:5 windows x86
4b98f53e6956f1b8b89f350f2923e894
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
GetModuleHandleA
CreateProcessA
GetEnvironmentVariableA
GetFileAttributesA
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
CreateToolhelp32Snapshot
Process32First
GetStdHandle
FlushFileBuffers
WriteConsoleW
SetFilePointerEx
GetConsoleCP
RtlUnwind
HeapReAlloc
HeapSize
LoadLibraryW
Sleep
GetLastError
GetCurrentProcess
Process32Next
GetProcAddress
EncodePointer
DecodePointer
InterlockedDecrement
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
GetConsoleMode
ReadConsoleInputA
SetConsoleMode
GetCommandLineA
IsDebuggerPresent
IsProcessorFeaturePresent
HeapFree
HeapAlloc
InterlockedIncrement
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
WideCharToMultiByte
SetLastError
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
WriteFile
GetModuleFileNameW
LoadLibraryExW
CreateFileW
GetProcessHeap
GetFileType
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
LCMapStringW
OutputDebugStringW
SetStdHandle
user32
GetWindowInfo
GetWindowThreadProcessId
EnumWindows
GetParent
GetWindowTextA
IsWindowVisible
ShowWindow
Sections
.text Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 123KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ