Static task
static1
Behavioral task
behavioral1
Sample
d79d1c50863e99b5d93d3d5f7f6c68a0f7774cd53e329a9cd626123c2d8b4716.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
d79d1c50863e99b5d93d3d5f7f6c68a0f7774cd53e329a9cd626123c2d8b4716.exe
Resource
win10v2004-20231023-en
General
-
Target
d79d1c50863e99b5d93d3d5f7f6c68a0f7774cd53e329a9cd626123c2d8b4716.zip
-
Size
95KB
-
MD5
33ceee16c132fc30f4e6d0d99a72733c
-
SHA1
e226f2f3ab41db1ba9f6b65aef4d13dbfa01361b
-
SHA256
2c53497609cbca72d4e4c790a346f6cac82dceb8eb0a48ec7c848b01473d19fc
-
SHA512
3ebd6c6f7261a43fd55abf4994a612d28a32cd7a37c98efa86d797c51efcf14b5d71103671db6f1777173888c366d76a5664f8c843dee56e8566816c42c2fda2
-
SSDEEP
1536:gJTjMQFX6Z3Ym7zHBHpOlBJ4lcE3gQv1Sm0OrOCv2czLPX1Bo+3I7D21S2:g5MQFKZbLBHpO/JZE3dvgm0iO02krXOm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/d79d1c50863e99b5d93d3d5f7f6c68a0f7774cd53e329a9cd626123c2d8b4716.exe
Files
-
d79d1c50863e99b5d93d3d5f7f6c68a0f7774cd53e329a9cd626123c2d8b4716.zip.zip
Password: infected
-
d79d1c50863e99b5d93d3d5f7f6c68a0f7774cd53e329a9cd626123c2d8b4716.exe.exe windows:6 windows x86 arch:x86
Password: infected
e5dbf4f8ccc1f4276248f5791017efa9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAllocEx
GetCommandLineA
FindNextFileA
HeapAlloc
InitializeCriticalSectionAndSpinCount
GlobalGetAtomNameW
DeleteFileW
FindClose
FindFirstFileW
FindNextFileW
GetTempPathW
VirtualAlloc
EnumSystemCodePagesA
SetEndOfFile
CreateFileW
OutputDebugStringW
ReadConsoleW
WriteConsoleW
SetStdHandle
LoadLibraryExW
HeapReAlloc
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetModuleFileNameW
SetFilePointerEx
ReadFile
GetFileType
GetStdHandle
GetConsoleMode
GetConsoleCP
WriteFile
FlushFileBuffers
CloseHandle
GetProcessHeap
IsDebuggerPresent
GetCurrentThreadId
GetOEMCP
GetACP
IsValidCodePage
HeapSize
AreFileApisANSI
GetModuleHandleExW
ExitProcess
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
GetLastError
HeapFree
RaiseException
RtlUnwind
GetCommandLineW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
GetProcAddress
IsProcessorFeaturePresent
oleaut32
VarDecFix
CreateStdDispatch
VarCyFromR4
VarFormatFromTokens
VarAdd
VarI2FromBool
VarI1FromStr
SafeArrayCreateVector
rpcrt4
I_RpcTransConnectionReallocPacket
NdrConformantVaryingStructBufferSize
MesIncrementalHandleReset
I_RpcParseSecurity
NdrComplexStructFree
NdrComplexStructMemorySize
wininet
GopherGetLocatorTypeW
InternetGetCertByURL
ShowSecurityInfo
HttpSendRequestExW
FtpPutFileA
InternetTimeFromSystemTime
InternetReadFileExA
ole32
ReleaseStgMedium
HWND_UserUnmarshal
HWND_UserSize
StgCreatePropSetStg
HBRUSH_UserMarshal
CLSIDFromProgID
resutils
ResUtilGetProperties
ResUtilGetPrivateProperties
ResUtilDupParameterBlock
ResUtilEnumPrivateProperties
winmm
GetDriverModuleHandle
mmioAdvance
midiInUnprepareHeader
auxGetNumDevs
waveOutWrite
NotifyCallbackData
auxGetDevCapsW
Sections
.text Size: 125KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE