Static task
static1
Behavioral task
behavioral1
Sample
49c7d7ecb156f0008085f060a158a2c128d0a8212882bbb052bd538138d69b6a.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
49c7d7ecb156f0008085f060a158a2c128d0a8212882bbb052bd538138d69b6a.dll
Resource
win10v2004-20231023-en
General
-
Target
c8372391eee74c64377fb86b6a37e0c3.bin
-
Size
53KB
-
MD5
452a1d18152d1a9b809d864b5ff3af85
-
SHA1
b7be83509d9c238cc459769f1e7ada77dc0c50ba
-
SHA256
2f0bad7337865fe6c2c456482714f551a624630d8478291484dc4ace71c2c036
-
SHA512
6bad83d78e2701455a02b16629055d4804a14af42bacb54f9557501908b9ef97682eb7d8f48ce22a89229e280e42623797d2b8250c60d9cc5bd9eaaee91e72a6
-
SSDEEP
768:zf8a97Wm0A8yRtLfuc1ySOYDcvAjXzza/1wZCChonZVAHr+p6TjBJUzXIv39H:78axWNA8yffj/2ojayI1Wr+b4/9H
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/49c7d7ecb156f0008085f060a158a2c128d0a8212882bbb052bd538138d69b6a.exe
Files
-
c8372391eee74c64377fb86b6a37e0c3.bin.zip
Password: infected
-
49c7d7ecb156f0008085f060a158a2c128d0a8212882bbb052bd538138d69b6a.exe.dll windows:6 windows x64
Password: infected
2997802cf0e4fb92a99c06480551856b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
kernel32
WinExec
ExitProcess
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
WriteConsoleW
RtlUnwindEx
InterlockedFlushSList
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
EncodePointer
RaiseException
RtlPcToFileHeader
GetCurrentProcess
TerminateProcess
GetModuleHandleExW
GetModuleFileNameW
HeapAlloc
HeapFree
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
LCMapStringW
GetProcessHeap
GetStdHandle
GetFileType
GetStringTypeW
HeapSize
HeapReAlloc
SetStdHandle
FlushFileBuffers
WriteFile
GetConsoleOutputCP
GetConsoleMode
SetFilePointerEx
CreateFileW
CloseHandle
Sections
.text Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ