Static task
static1
Behavioral task
behavioral1
Sample
fb64f14ee4dc8b8c5348211ccd545c52736fe12509ca62d567f60753679d93a5.exe
Resource
win7-20231025-en
General
-
Target
72a0b32492da29c09de94b30d4666a63.bin
-
Size
78KB
-
MD5
69c8fc745e21046bd1be2a88f2db29aa
-
SHA1
d8424549ed200c0f48de53e8452303409e1c2805
-
SHA256
e5b8941b39f4134322ff7fe67117d5f070cdfed5cd5d121f29829fe9bf52e687
-
SHA512
1b8a78b696fdf025bf742ee67e9c036339ccd288f881d8cbdfd39a83559b27ac293476dfc956721ceb47c107402f1771286476a96d656b11dce1d97945f16dca
-
SSDEEP
1536:RUx9ull5W3loqTMnvi7uwYHiGALo1Zx4bv9UF4tyuOfE4q6n2xRtol:u8MlZTLYCGr1Ybv9aUmOg2xnol
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/fb64f14ee4dc8b8c5348211ccd545c52736fe12509ca62d567f60753679d93a5.exe
Files
-
72a0b32492da29c09de94b30d4666a63.bin.zip
Password: infected
-
fb64f14ee4dc8b8c5348211ccd545c52736fe12509ca62d567f60753679d93a5.exe.exe windows:4 windows x86
Password: infected
edf46b6a9aceeebc55eb9cb33ed4d508
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
MultiByteToWideChar
WideCharToMultiByte
FreeLibrary
GetProcAddress
LoadLibraryA
FlushFileBuffers
Module32First
SetStdHandle
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
SetFilePointer
InterlockedIncrement
InterlockedDecrement
VirtualAlloc
GetOEMCP
GetACP
GetCPInfo
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
RaiseException
WriteFile
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
CreateToolhelp32Snapshot
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
GetLastError
user32
SendMessageA
DialogBoxParamA
LoadIconA
GetDlgItem
EndDialog
GetDesktopWindow
GetWindow
wsprintfA
MessageBoxA
GetWindowTextA
GetClassNameA
GetWindowThreadProcessId
ole32
CoUninitialize
CoInitialize
oleaut32
VarR8FromCy
VarR8FromBool
SafeArrayCreate
SysAllocString
VariantClear
SafeArrayDestroy
atl
ord42
ord47
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE