Static task
static1
Behavioral task
behavioral1
Sample
f0f8649135af4815cf441bd553124b2f422d39667dcb7d0f476a9cc5a871767d.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
f0f8649135af4815cf441bd553124b2f422d39667dcb7d0f476a9cc5a871767d.exe
Resource
win10v2004-20231023-en
General
-
Target
4b0a82dc47565ead19950288805f43e2.bin
-
Size
88KB
-
MD5
12a7bc175a9f2fe59b25380fb9ec18e8
-
SHA1
654a0970ef5509476740df1b5ba9dbe98b6edc5e
-
SHA256
91136190445c00b3e7cf2dbe26ddfd7b8007ec0cbbc7f9039dcbddd16e9f7740
-
SHA512
b3a870b3e552800e053cc6c278e767a659c7f440d1e9df4b4ee57952b4007817765860b5b61fa14cfe7d651c66f1db1a82d2de3eb5f2bc0f2a366366983a54fc
-
SSDEEP
1536:d9jfivxfaLPQTp9qICV7x6dYQc//egh9qx+ZqeM1F7qflVNOnHa6zyySp6I3y:dJa12QT6ICD6mQc/h9qxQqeAFq3N8J+Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/f0f8649135af4815cf441bd553124b2f422d39667dcb7d0f476a9cc5a871767d.exe
Files
-
4b0a82dc47565ead19950288805f43e2.bin.zip
Password: infected
-
f0f8649135af4815cf441bd553124b2f422d39667dcb7d0f476a9cc5a871767d.exe.exe windows:6 windows x86
Password: infected
5a23357764f0c833dcd1a07cf87f8149
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathIsDirectoryA
PathAddBackslashW
SHRegEnumUSKeyW
UrlGetLocationW
StrNCatA
kernel32
GetCurrentProcessId
WriteConsoleW
HeapSize
CreateFileW
SetStdHandle
HeapAlloc
GetProcessHeap
Sleep
GetProcAddress
LoadLibraryA
EnumSystemCodePagesW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapReAlloc
ReadConsoleW
SetFilePointerEx
GetFileSizeEx
ReadFile
GetConsoleMode
GetConsoleCP
FlushFileBuffers
CloseHandle
GetFileType
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
HeapFree
GetModuleHandleExW
ExitProcess
GetModuleFileNameW
WriteFile
GetStdHandle
LoadLibraryExW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
WideCharToMultiByte
LCMapStringEx
GetStringTypeW
GetCPInfo
IsProcessorFeaturePresent
QueryPerformanceCounter
SetEndOfFile
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
GetCurrentProcess
TerminateProcess
RaiseException
RtlUnwind
GetLastError
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
mswsock
EnumProtocolsA
EnumProtocolsW
WSARecvEx
AcceptEx
SetServiceA
GetAddressByNameA
rcmd
getnetbyname
rexec
user32
CharUpperA
UserHandleGrantAccess
CreateIconFromResourceEx
mouse_event
DdeSetQualityOfService
wsock32
WSAStartup
WSASetBlockingHook
getprotobynumber
msacm32
acmFilterChooseW
acmFilterEnumA
acmStreamUnprepareHeader
acmStreamConvert
acmFormatTagEnumA
acmDriverAddW
acmDriverOpen
acmFormatEnumW
acmGetVersion
acmMetrics
ole32
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
VariantInit
SysAllocString
Sections
.text Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE