Static task
static1
Behavioral task
behavioral1
Sample
d2c19e15edee855176d5dbf18b19833779e009573573b419c0513e3cf82e6650.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
d2c19e15edee855176d5dbf18b19833779e009573573b419c0513e3cf82e6650.exe
Resource
win10v2004-20231023-en
General
-
Target
f108227d38726fe1d83281f8c3a6acd0.bin
-
Size
161KB
-
MD5
a349acdef3fac033f860f65e92e6bb7b
-
SHA1
f893e7a6b50601dc659465ba135728c81127a995
-
SHA256
5b757b065a522544a3ca63bfe9ec18274c5908c4ba1c5c413b546025e0916b5d
-
SHA512
b313c36a61612a3f6d86926d71c2a8e1dd377c7294c5238d924ffb01186a01990c989cae69b50640951fdc35f01d4e20bf72a4888d56a9e8ec416f8015884b27
-
SSDEEP
3072:0q4aBp2hdLIo/DK3z4/zb44neX+L+3m465RkKWSRo/EuWjAYnAnk1WXNcI1:0sj2Yo+0/flf6///E7A4An2WdF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/d2c19e15edee855176d5dbf18b19833779e009573573b419c0513e3cf82e6650.exe
Files
-
f108227d38726fe1d83281f8c3a6acd0.bin.zip
Password: infected
-
d2c19e15edee855176d5dbf18b19833779e009573573b419c0513e3cf82e6650.exe.exe windows:5 windows x86
Password: infected
c9841028b9dc21821bee70c3fbfd867e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocalTime
WaitForSingleObject
Sleep
CreateThread
lstrlenW
VirtualProtect
GetProcAddress
LoadLibraryA
VirtualAlloc
GetModuleHandleA
FreeConsole
GetLastError
HeapFree
HeapAlloc
RtlUnwind
GetCommandLineA
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
SetUnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
RaiseException
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 346KB - Virtual size: 349KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE