Static task
static1
Behavioral task
behavioral1
Sample
c0a2e1ecf57ee83b649f1d8ff8dd37049865edc8b9a837f3b4ebb5e767229c23.exe
Resource
win7-20231020-en
General
-
Target
8cc24750661e10f55eb250b42f8ce528.bin
-
Size
60KB
-
MD5
a44623e66e98dfe702c93b2054058e4c
-
SHA1
30fbd1e201df1b0e0f60417ad7a99e89003023d9
-
SHA256
76f74029cb68e28f191c82ddfccdcddd8d0ee8e29470dd17802b21b7de735561
-
SHA512
7c98a8b1d649f0a16538e2880228ac9a5ea08511e83076b9a8e3235145d9445d1db36daa1478aaf4d604f325fb08ef8153fc40204621c7188c7e2d76f92e5b54
-
SSDEEP
1536:QgeTQVX8rb3qeiaCjhWpc1oN/fyfvK3WZL:QgeT3rb6cOTY373aL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/c0a2e1ecf57ee83b649f1d8ff8dd37049865edc8b9a837f3b4ebb5e767229c23.exe
Files
-
8cc24750661e10f55eb250b42f8ce528.bin.zip
Password: infected
-
c0a2e1ecf57ee83b649f1d8ff8dd37049865edc8b9a837f3b4ebb5e767229c23.exe.exe windows:6 windows x86
Password: infected
ae50b343d74035e4059849a39724400f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpynW
SetEndOfFile
CreateFileW
GetLastError
CloseHandle
SetFilePointerEx
MoveFileW
WaitForSingleObject
GetNativeSystemInfo
CreateThread
HeapFree
HeapAlloc
GetProcessHeap
CancelIo
CreateTimerQueueTimer
EnterCriticalSection
DeleteTimerQueue
LeaveCriticalSection
WriteFile
GetQueuedCompletionStatus
ExitThread
PostQueuedCompletionStatus
Sleep
lstrcatW
GlobalAlloc
GlobalFree
DeleteCriticalSection
lstrcpyW
CreateIoCompletionPort
CreateTimerQueue
FindFirstFileW
FindNextFileW
FindClose
lstrcmpW
VirtualAlloc
WaitForMultipleObjects
WriteConsoleW
GetFileSizeEx
ReadFile
GetLogicalDriveStringsW
InitializeCriticalSection
lstrlenW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
HeapReAlloc
HeapSize
LCMapStringW
CompareStringW
GetStringTypeW
GetFileType
SetStdHandle
SetEnvironmentVariableW
DecodePointer
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwind
RaiseException
SetLastError
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetStdHandle
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
MultiByteToWideChar
advapi32
CryptImportKey
CryptAcquireContextA
CryptDecrypt
iphlpapi
GetIpNetTable
netapi32
NetApiBufferFree
NetShareEnum
shlwapi
StrStrIW
StrStrIA
ws2_32
WSAStartup
socket
WSAAddressToStringW
inet_ntoa
shutdown
WSAIoctl
htons
setsockopt
WSAGetLastError
WSASocketW
gethostbyname
bind
closesocket
WSACleanup
gethostname
getsockopt
Sections
.text Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ