Static task
static1
Behavioral task
behavioral1
Sample
146877700a9c6cfce2fccc61168ef9e2b0681354dd83f812a65de2ff37189a44.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
146877700a9c6cfce2fccc61168ef9e2b0681354dd83f812a65de2ff37189a44.exe
Resource
win10v2004-20231127-en
General
-
Target
e12686ff0bbd4c5977b3d51d276b4cce.bin
-
Size
259KB
-
MD5
2ea034bf3e10bde1d8de4f38d15ae2db
-
SHA1
ae1b4111a74c08a6ae2f0e77b33ccec25da4b1dd
-
SHA256
c56c323e94a2c399a9e306fba9d32b33d36c392362680ed9189ab9bb32c6cc71
-
SHA512
6348c7b8d770f09a7d4ced07b79bde89aff8ba5301c5a42f1544cea0402d4f9092f02949c905b3bb87f8316ccefd2ea012bad97fd08df94aafc493c4f392085e
-
SSDEEP
6144:DZg3wUHTIyEAKI7uiEAdBaYM5QzOsTmQZhHHVqCNzf:DZgAUAKqWGYMNsvq0f
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/146877700a9c6cfce2fccc61168ef9e2b0681354dd83f812a65de2ff37189a44.exe
Files
-
e12686ff0bbd4c5977b3d51d276b4cce.bin.zip
Password: infected
-
146877700a9c6cfce2fccc61168ef9e2b0681354dd83f812a65de2ff37189a44.exe.exe windows:6 windows x86
Password: infected
92e95e2d8cab4d4bf9ab0dae6fc468a5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
imm32
ImmCreateIMCC
ImmEnumRegisterWordW
ImmGetCandidateListCountA
ImmInstallIMEA
ImmReSizeIMCC
ImmRequestMessageW
ImmUnregisterWordA
msacm32
acmDriverClose
acmFilterTagDetailsA
acmFilterTagDetailsW
acmFilterTagEnumA
acmFilterTagEnumW
acmFormatDetailsA
acmMessage32
acmStreamSize
ole32
BindMoniker
CLSIDFromString
CoCreateInstance
CoInitialize
CoUninitialize
CreateILockBytesOnHGlobal
IsEqualGUID
OleCreate
StgIsStorageILockBytes
WriteStringStream
mpr
WNetAddConnection2W
WNetAddConnectionW
WNetConnectionDialog1A
WNetDisconnectDialog1A
WNetEnumResourceW
WNetGetNetworkInformationW
WNetGetProviderNameA
WNetGetResourceInformationA
WNetGetResourceParentA
WNetGetUniversalNameW
wsock32
ord1141
WSAAsyncGetProtoByName
WSASetBlockingHook
gethostbyname
recvfrom
ord1103
socket
odbc32
ODBCInternalConnectW
ord86
ord206
ord29
ord250
urlmon
CopyBindInfo
GetClassURL
HlinkNavigateMoniker
URLDownloadToCacheFileA
UrlMkGetSessionOption
setupapi
SetupDeleteErrorA
SetupDiGetDeviceInfoListClass
SetupDiInstallClassExA
SetupDiOpenDeviceInterfaceW
SetupDiRemoveDeviceInterface
SetupGetFileCompressionInfoA
SetupGetInfFileListW
SetupGetMultiSzFieldW
oleaut32
VariantInit
kernel32
AcquireSRWLockExclusive
CloseHandle
CompareStringEx
CompareStringW
CreateFileW
DecodePointer
DeleteCriticalSection
EncodePointer
EnterCriticalSection
EnumSystemCodePagesA
EnumSystemLocalesW
ExitProcess
FindClose
FindFirstFileExW
FindNextFileW
FlushFileBuffers
FormatMessageA
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleMode
GetConsoleOutputCP
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatW
GetEnvironmentStringsW
GetFileSizeEx
GetFileType
GetLastError
GetLocaleInfoEx
GetLocaleInfoW
GetModuleFileNameW
GetModuleHandleExW
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemTimeAsFileTime
GetTempPathW
GetTimeFormatW
GetTimeZoneInformation
GetUserDefaultLCID
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSectionAndSpinCount
InitializeCriticalSectionEx
InitializeSListHead
InterlockedFlushSList
InterlockedPushEntrySList
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
IsValidLocale
LCMapStringEx
LCMapStringW
LeaveCriticalSection
LoadLibraryA
LoadLibraryExW
LocalFree
MultiByteToWideChar
OutputDebugStringW
QueryPerformanceCounter
RaiseException
ReadConsoleW
ReadFile
ReleaseSRWLockExclusive
RtlUnwind
SetConsoleCtrlHandler
SetEndOfFile
SetEnvironmentVariableW
SetFilePointerEx
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
SleepConditionVariableSRW
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
WakeAllConditionVariable
WideCharToMultiByte
WriteConsoleW
WriteFile
Sections
.text Size: 453KB - Virtual size: 453KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 78KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE