Static task
static1
Behavioral task
behavioral1
Sample
d8a2f79ef593016b61a3bb8d0cf87312c162f5abc26cc44eb8653545c25d5808.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
d8a2f79ef593016b61a3bb8d0cf87312c162f5abc26cc44eb8653545c25d5808.exe
Resource
win10v2004-20231020-en
General
-
Target
68dd8f254f6b67cfac490468e2435cea.bin
-
Size
1.6MB
-
MD5
96999f1b7f211ffc667a4099d333145e
-
SHA1
7538e40ef5623233e11a8a154f8354d5d2d21636
-
SHA256
d24bc2e1671574120960f54380947007ba3507c58f8ff7464f8d9c72a72be83f
-
SHA512
1aa7ff918254717bea991e12b3d01ee1e2d9d72ae9b50528d5b5481a6dd375af358cb425c68af5f82d9fa058f4c747ce6e765c9feb17b7e35b0eb0e232016c77
-
SSDEEP
24576:7eluQ5/+/NSc2qwMMm/F2IEK6PJwyxBNBT/wRpiYcwn2mRT1AFU2O0eu:7HQR+JMmtdEPqyXNBjwRpiYJ2msFjOs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/d8a2f79ef593016b61a3bb8d0cf87312c162f5abc26cc44eb8653545c25d5808.exe
Files
-
68dd8f254f6b67cfac490468e2435cea.bin.zip
Password: infected
-
d8a2f79ef593016b61a3bb8d0cf87312c162f5abc26cc44eb8653545c25d5808.exe.exe windows:4 windows x86
Password: infected
60fbd35de1521df68e303d54b2c1b0c8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetEnvironmentVariableW
GetLastError
CreateDirectoryW
FindClose
FindFirstFileW
CloseHandle
CreateFileW
FreeLibrary
GetDriveTypeW
MultiByteToWideChar
TerminateThread
GetCurrentThread
GetExitCodeThread
WaitForSingleObject
GetModuleHandleW
WideCharToMultiByte
GetTempFileNameW
GetTempPathW
LoadLibraryA
GetSystemDefaultLangID
GetComputerNameW
SetFileAttributesW
CopyFileW
Sleep
GetCurrentProcessId
GetModuleFileNameW
CreateProcessW
lstrlenW
GetSystemInfo
GetVersionExW
SetEnvironmentVariableA
GetOEMCP
CreateThread
GetProcAddress
GetACP
CompareStringW
CompareStringA
SetEndOfFile
GetStringTypeW
GetStringTypeA
FlushFileBuffers
HeapAlloc
GetProcessHeap
VirtualAlloc
VirtualProtect
VirtualFree
IsBadReadPtr
HeapFree
DeleteFileW
GetSystemTime
RtlUnwind
GetTimeZoneInformation
InterlockedDecrement
InterlockedIncrement
RaiseException
GetModuleHandleA
GetStartupInfoW
GetVersion
ExitProcess
HeapReAlloc
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
HeapSize
HeapDestroy
HeapCreate
IsBadWritePtr
WriteFile
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetEnvironmentStrings
GetCommandLineW
GetCommandLineA
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
SetFilePointer
ReadFile
IsBadCodePtr
LCMapStringA
LCMapStringW
GetCPInfo
SetStdHandle
user32
GetSystemMetrics
wsprintfW
advapi32
GetUserNameW
iphlpapi
GetAdaptersInfo
ws2_32
inet_addr
Sections
.text Size: 89KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ