Static task
static1
Behavioral task
behavioral1
Sample
16c16e0fdb885f7d1d7377d3cd7297b212966e45f384a5252cfd9e8ebcdcb702.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
16c16e0fdb885f7d1d7377d3cd7297b212966e45f384a5252cfd9e8ebcdcb702.exe
Resource
win10v2004-20231023-en
General
-
Target
5c80dfa02c503109cdae7142b4a1a9cd.bin
-
Size
5.6MB
-
MD5
47ebf9daf6ae4e533c589247d750d376
-
SHA1
dec88c870360f8898e0bd69a86c693ba2376a206
-
SHA256
f04cf734b2517895095bcc274a91e3a12cde1b18072849e4b95d9f69ad154745
-
SHA512
380d5488afbc527caf3e69053ee2b6a060d449f2992a03cd6a3cc02a962c522c36f0336a270e48a6f04341f99e46f141e1bae3fa87e1c14655628f8f82069796
-
SSDEEP
98304:tGEKzt7w5xkWydiHhItNwJpMGWe5CwMA6y+Fk4uCy9Si5SxgQR81112:tGE8Nwj28hIt8yGnS/dgYxgEgC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/16c16e0fdb885f7d1d7377d3cd7297b212966e45f384a5252cfd9e8ebcdcb702.exe
Files
-
5c80dfa02c503109cdae7142b4a1a9cd.bin.zip
Password: infected
-
16c16e0fdb885f7d1d7377d3cd7297b212966e45f384a5252cfd9e8ebcdcb702.exe.exe windows:6 windows x86
Password: infected
0d0546185239791e3ac977a371dfba41
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExA
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
GetWindowRect
gdi32
CreateCompatibleBitmap
advapi32
SystemFunction036
shell32
SHGetFolderPathA
ole32
CoCreateInstance
ws2_32
WSACleanup
crypt32
CryptUnprotectData
shlwapi
PathFindExtensionA
gdiplus
GdipSaveImageToFile
setupapi
SetupDiEnumDeviceInterfaces
ntdll
RtlUnicodeStringToAnsiString
Sections
.text Size: - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 202KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp‹� Size: - Virtual size: 3.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp‹� Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp‹� Size: 5.6MB - Virtual size: 5.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 150KB - Virtual size: 149KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ