Static task
static1
Behavioral task
behavioral1
Sample
eb54dab9a40c3f156794c2c4294e04a44e25232e32602d38882ff59057d223ca.exe
Resource
win7-20231023-en
General
-
Target
53de52681666c9f76258224aac7e94e0.bin
-
Size
140KB
-
MD5
86eb41acd38bfdbb0e515317e5487b1a
-
SHA1
2c6fc24717564c0a47fbc3145062564193adf1de
-
SHA256
e8983b4d6489a8879d9649c319977d84109fdad1278d2d4619d0cef493054fb3
-
SHA512
0603c866740757d6bc1e72de102f39940da98dd778f64f57e9da76d24b51e6cd236c7c260eac2a40eb2815929c444dc8ad71d5e58f5115b9411363756d103bb6
-
SSDEEP
3072:eKlShVSRxt9L/xLk2PD59MnaNZU86n/r+8Q/5G8dlPd8m:9M6RxHjdkelmnaNK86z+8mD18m
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/eb54dab9a40c3f156794c2c4294e04a44e25232e32602d38882ff59057d223ca.exe
Files
-
53de52681666c9f76258224aac7e94e0.bin.zip
Password: infected
-
eb54dab9a40c3f156794c2c4294e04a44e25232e32602d38882ff59057d223ca.exe.exe windows:5 windows x86
Password: infected
c8a352bf73a61d8e36f530e1798f43a3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AllocConsole
GlobalCompact
WriteConsoleOutputCharacterA
ReadConsoleA
GetEnvironmentStringsW
GetUserDefaultLCID
SetConsoleScreenBufferSize
WriteConsoleInputA
OpenSemaphoreA
SetCommBreak
GetFileAttributesExA
SetTapeParameters
GetModuleHandleW
GenerateConsoleCtrlEvent
GetWindowsDirectoryA
GetConsoleAliasExesW
WaitNamedPipeW
FindActCtxSectionStringA
SetCommState
GetDriveTypeA
AddRefActCtx
GlobalFindAtomA
LoadLibraryW
CopyFileW
_hread
CreateEventA
GetFileAttributesA
SetConsoleMode
GetConsoleAliasW
SetSystemPowerState
TerminateProcess
ReplaceFileW
GetCompressedFileSizeA
GetTimeZoneInformation
lstrlenW
FindNextVolumeMountPointW
GetStartupInfoW
GetTempPathW
WriteConsoleInputW
GetConsoleAliasesW
FindFirstFileA
GetLastError
GetCurrentDirectoryW
SetLastError
CreateConsoleScreenBuffer
EnumSystemCodePagesW
SetStdHandle
VerLanguageNameW
GlobalGetAtomNameA
FindClose
LoadLibraryA
LocalAlloc
MoveFileA
AddVectoredExceptionHandler
RemoveDirectoryW
SetFileApisToANSI
WriteProfileSectionW
GlobalGetAtomNameW
GetCurrentConsoleFont
FoldStringA
FindNextFileA
FindFirstChangeNotificationA
FindNextFileW
GetStringTypeW
VirtualProtect
CompareStringA
QueryPerformanceFrequency
FatalAppExitA
FindAtomW
DeleteFileW
MoveFileWithProgressW
AddConsoleAliasA
ResetWriteWatch
ReadConsoleOutputCharacterW
EnumSystemLocalesW
CloseHandle
WriteConsoleW
SetLocaleInfoA
GetShortPathNameA
GetNumaNodeProcessorMask
FlushFileBuffers
GetConsoleMode
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
GetCommandLineW
HeapSetInformation
RaiseException
RtlUnwind
HeapAlloc
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
IsProcessorFeaturePresent
HeapCreate
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCurrentProcess
SetFilePointer
GetProcAddress
ExitProcess
WriteFile
GetModuleFileNameW
FreeEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoW
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
HeapReAlloc
GetConsoleCP
CreateFileW
user32
CharUpperA
advapi32
ClearEventLogA
AbortSystemShutdownW
winhttp
WinHttpWriteData
WinHttpGetProxyForUrl
Sections
.text Size: 159KB - Virtual size: 159KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 3.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 53KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ