Static task
static1
Behavioral task
behavioral1
Sample
d79d1c50863e99b5d93d3d5f7f6c68a0f7774cd53e329a9cd626123c2d8b4716.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
d79d1c50863e99b5d93d3d5f7f6c68a0f7774cd53e329a9cd626123c2d8b4716.exe
Resource
win10v2004-20231020-en
General
-
Target
af8589ad7b9edf29559886b6c11320c5.bin
-
Size
95KB
-
MD5
10864474aba66c9f50888451f6c24050
-
SHA1
8d964c7348d593ee9b5d036a08e836bcb65318fa
-
SHA256
d4d592e1502432148818278b15ee09166ac4d3e90a2038f3751c6bfe73fda9cc
-
SHA512
9157cab854bd4abdd50c838a959f6a91e852e7ff07d4be93838db3369861cd84dabddb16f6e7046b2ca666621b553829e6490815e285bce52fcd9b43be975cfa
-
SSDEEP
1536:DRyY7fIykRFi/gt1+bGov3XzfZw4yOQJiYOcxvXB4YeyOhxTEaq6K:DRvMHztcFvTfZw4YiyB455xTE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/d79d1c50863e99b5d93d3d5f7f6c68a0f7774cd53e329a9cd626123c2d8b4716.exe
Files
-
af8589ad7b9edf29559886b6c11320c5.bin.zip
Password: infected
-
d79d1c50863e99b5d93d3d5f7f6c68a0f7774cd53e329a9cd626123c2d8b4716.exe.exe windows:6 windows x86 arch:x86
Password: infected
e5dbf4f8ccc1f4276248f5791017efa9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAllocEx
GetCommandLineA
FindNextFileA
HeapAlloc
InitializeCriticalSectionAndSpinCount
GlobalGetAtomNameW
DeleteFileW
FindClose
FindFirstFileW
FindNextFileW
GetTempPathW
VirtualAlloc
EnumSystemCodePagesA
SetEndOfFile
CreateFileW
OutputDebugStringW
ReadConsoleW
WriteConsoleW
SetStdHandle
LoadLibraryExW
HeapReAlloc
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetModuleFileNameW
SetFilePointerEx
ReadFile
GetFileType
GetStdHandle
GetConsoleMode
GetConsoleCP
WriteFile
FlushFileBuffers
CloseHandle
GetProcessHeap
IsDebuggerPresent
GetCurrentThreadId
GetOEMCP
GetACP
IsValidCodePage
HeapSize
AreFileApisANSI
GetModuleHandleExW
ExitProcess
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
GetLastError
HeapFree
RaiseException
RtlUnwind
GetCommandLineW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
GetProcAddress
IsProcessorFeaturePresent
oleaut32
VarDecFix
CreateStdDispatch
VarCyFromR4
VarFormatFromTokens
VarAdd
VarI2FromBool
VarI1FromStr
SafeArrayCreateVector
rpcrt4
I_RpcTransConnectionReallocPacket
NdrConformantVaryingStructBufferSize
MesIncrementalHandleReset
I_RpcParseSecurity
NdrComplexStructFree
NdrComplexStructMemorySize
wininet
GopherGetLocatorTypeW
InternetGetCertByURL
ShowSecurityInfo
HttpSendRequestExW
FtpPutFileA
InternetTimeFromSystemTime
InternetReadFileExA
ole32
ReleaseStgMedium
HWND_UserUnmarshal
HWND_UserSize
StgCreatePropSetStg
HBRUSH_UserMarshal
CLSIDFromProgID
resutils
ResUtilGetProperties
ResUtilGetPrivateProperties
ResUtilDupParameterBlock
ResUtilEnumPrivateProperties
winmm
GetDriverModuleHandle
mmioAdvance
midiInUnprepareHeader
auxGetNumDevs
waveOutWrite
NotifyCallbackData
auxGetDevCapsW
Sections
.text Size: 125KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE