Static task
static1
Behavioral task
behavioral1
Sample
b89afe8f268ee82f378f123ec7dbb7de41e296d1ef26993f03f29b0f7b39884c.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
b89afe8f268ee82f378f123ec7dbb7de41e296d1ef26993f03f29b0f7b39884c.exe
Resource
win10v2004-20231023-en
General
-
Target
55e6590fc74de8da96915ca2198e0584.bin
-
Size
140KB
-
MD5
0a482349523f4527da926416c3c63479
-
SHA1
9ae97ec634aa3a91c6701a55c97e1cb88ebd0664
-
SHA256
80d87250526305932bc05b76155d5ffbf0a86e1c73b4f22f4e8c600850f36f41
-
SHA512
23292f967536dbbb72176a14a9bec8e852d13e4df0e8ad59918e4d78f54aaa5b9606430d26eb9b96c2fb3b1840787ae8aed6149570465baf2b04bbab4f33ed1b
-
SSDEEP
3072:t5OU6/F64yB1Ug2FRaNJP9dzoVLcE8srO7gCtt3rfkiEfGCI2a+:Ht6s4CUg2TSJldzoP8qOFNrfkiMg+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/b89afe8f268ee82f378f123ec7dbb7de41e296d1ef26993f03f29b0f7b39884c.exe
Files
-
55e6590fc74de8da96915ca2198e0584.bin.zip
Password: infected
-
b89afe8f268ee82f378f123ec7dbb7de41e296d1ef26993f03f29b0f7b39884c.exe.exe windows:5 windows x86
Password: infected
c8a352bf73a61d8e36f530e1798f43a3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AllocConsole
GlobalCompact
WriteConsoleOutputCharacterA
ReadConsoleA
GetEnvironmentStringsW
GetUserDefaultLCID
SetConsoleScreenBufferSize
WriteConsoleInputA
OpenSemaphoreA
SetCommBreak
GetFileAttributesExA
SetTapeParameters
GetModuleHandleW
GenerateConsoleCtrlEvent
GetWindowsDirectoryA
GetConsoleAliasExesW
WaitNamedPipeW
FindActCtxSectionStringA
SetCommState
GetDriveTypeA
AddRefActCtx
GlobalFindAtomA
LoadLibraryW
CopyFileW
_hread
CreateEventA
GetFileAttributesA
SetConsoleMode
GetConsoleAliasW
SetSystemPowerState
TerminateProcess
ReplaceFileW
GetCompressedFileSizeA
GetTimeZoneInformation
lstrlenW
FindNextVolumeMountPointW
GetStartupInfoW
GetTempPathW
WriteConsoleInputW
GetConsoleAliasesW
FindFirstFileA
GetLastError
GetCurrentDirectoryW
SetLastError
CreateConsoleScreenBuffer
EnumSystemCodePagesW
SetStdHandle
VerLanguageNameW
GlobalGetAtomNameA
FindClose
LoadLibraryA
LocalAlloc
MoveFileA
AddVectoredExceptionHandler
RemoveDirectoryW
SetFileApisToANSI
WriteProfileSectionW
GlobalGetAtomNameW
GetCurrentConsoleFont
FoldStringA
FindNextFileA
FindFirstChangeNotificationA
FindNextFileW
GetStringTypeW
VirtualProtect
CompareStringA
QueryPerformanceFrequency
FatalAppExitA
FindAtomW
DeleteFileW
MoveFileWithProgressW
AddConsoleAliasA
ResetWriteWatch
ReadConsoleOutputCharacterW
EnumSystemLocalesW
CloseHandle
WriteConsoleW
SetLocaleInfoA
GetShortPathNameA
GetNumaNodeProcessorMask
FlushFileBuffers
GetConsoleMode
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
GetCommandLineW
HeapSetInformation
RaiseException
RtlUnwind
HeapAlloc
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
IsProcessorFeaturePresent
HeapCreate
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCurrentProcess
SetFilePointer
GetProcAddress
ExitProcess
WriteFile
GetModuleFileNameW
FreeEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoW
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
HeapReAlloc
GetConsoleCP
CreateFileW
user32
CharUpperA
advapi32
ClearEventLogA
AbortSystemShutdownW
winhttp
WinHttpWriteData
WinHttpGetProxyForUrl
Sections
.text Size: 159KB - Virtual size: 159KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 3.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 53KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ