Static task
static1
Behavioral task
behavioral1
Sample
d79d1c50863e99b5d93d3d5f7f6c68a0f7774cd53e329a9cd626123c2d8b4716.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
d79d1c50863e99b5d93d3d5f7f6c68a0f7774cd53e329a9cd626123c2d8b4716.exe
Resource
win10v2004-20231023-en
General
-
Target
d79d1c50863e99b5d93d3d5f7f6c68a0f7774cd53e329a9cd626123c2d8b4716.zip
-
Size
95KB
-
MD5
2ae1a29398a02e543355b78aa3c94fc4
-
SHA1
69dd3e7bc829ee96d16f6618daed8b7bb1597073
-
SHA256
bf026899a7fb69128aba343aae020a299c688509899f8b10915f8876c9eda839
-
SHA512
916de088742022aa4fd5a5d063c15650670ebbb842fcf03ce95af23ceed4f92266dd43b9d266d6f2fff97554039a9b9f0b36ed9c6e2d994f5afb8af0b46b4d69
-
SSDEEP
1536:w67cypdNrgvd/i4gTm7QCxy3VRuZjup3RNnfcZVBgp7hewMVcYH8PuEhXkGxkZnd:DNEF6ms33VRcupBhfcZY7MVYPuEhXlMd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/d79d1c50863e99b5d93d3d5f7f6c68a0f7774cd53e329a9cd626123c2d8b4716.exe
Files
-
d79d1c50863e99b5d93d3d5f7f6c68a0f7774cd53e329a9cd626123c2d8b4716.zip.zip
Password: infected
-
d79d1c50863e99b5d93d3d5f7f6c68a0f7774cd53e329a9cd626123c2d8b4716.exe.exe windows:6 windows x86 arch:x86
Password: infected
e5dbf4f8ccc1f4276248f5791017efa9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAllocEx
GetCommandLineA
FindNextFileA
HeapAlloc
InitializeCriticalSectionAndSpinCount
GlobalGetAtomNameW
DeleteFileW
FindClose
FindFirstFileW
FindNextFileW
GetTempPathW
VirtualAlloc
EnumSystemCodePagesA
SetEndOfFile
CreateFileW
OutputDebugStringW
ReadConsoleW
WriteConsoleW
SetStdHandle
LoadLibraryExW
HeapReAlloc
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetModuleFileNameW
SetFilePointerEx
ReadFile
GetFileType
GetStdHandle
GetConsoleMode
GetConsoleCP
WriteFile
FlushFileBuffers
CloseHandle
GetProcessHeap
IsDebuggerPresent
GetCurrentThreadId
GetOEMCP
GetACP
IsValidCodePage
HeapSize
AreFileApisANSI
GetModuleHandleExW
ExitProcess
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
GetLastError
HeapFree
RaiseException
RtlUnwind
GetCommandLineW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
GetProcAddress
IsProcessorFeaturePresent
oleaut32
VarDecFix
CreateStdDispatch
VarCyFromR4
VarFormatFromTokens
VarAdd
VarI2FromBool
VarI1FromStr
SafeArrayCreateVector
rpcrt4
I_RpcTransConnectionReallocPacket
NdrConformantVaryingStructBufferSize
MesIncrementalHandleReset
I_RpcParseSecurity
NdrComplexStructFree
NdrComplexStructMemorySize
wininet
GopherGetLocatorTypeW
InternetGetCertByURL
ShowSecurityInfo
HttpSendRequestExW
FtpPutFileA
InternetTimeFromSystemTime
InternetReadFileExA
ole32
ReleaseStgMedium
HWND_UserUnmarshal
HWND_UserSize
StgCreatePropSetStg
HBRUSH_UserMarshal
CLSIDFromProgID
resutils
ResUtilGetProperties
ResUtilGetPrivateProperties
ResUtilDupParameterBlock
ResUtilEnumPrivateProperties
winmm
GetDriverModuleHandle
mmioAdvance
midiInUnprepareHeader
auxGetNumDevs
waveOutWrite
NotifyCallbackData
auxGetDevCapsW
Sections
.text Size: 125KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE