Static task
static1
General
-
Target
Vidar - 05.12.2022.zip
-
Size
324KB
-
MD5
d2078a778e3c07edd8510732dc882485
-
SHA1
6c21d8c2bf0ced0b0fc1d8899e36cf674c2fc871
-
SHA256
a1549eabd410f179feb82c288c87b7877cdb925ac15c10b843589e4e4074ff9e
-
SHA512
bff856a9c4763f5dc2a8cf90523822d3f7dda1a0d4cd178fb04d01b645fc4d31e9af4880db22ef541681f488c700044bd18d3c09fb86c465e625ae0866c5dd4e
-
SSDEEP
6144:loIWWwhGxeMcgTn8QK0sfLhBbwcgrCg2nMWPKmiCySfT9yeM2LR5WHshkNYYRWGt:MWw4xrHazhpwzWSCycT8eMaRkHshkKXE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Setup.exe
Files
-
Vidar - 05.12.2022.zip.zip
Password: infected
-
Setup.exe.exe windows:6 windows x86 arch:x86
1fc346846c4332942d040ed8a67889d4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLastError
VirtualAlloc
lstrlenA
GetLastError
CloseHandle
FreeConsole
HeapAlloc
GetProcAddress
LoadLibraryExW
GetSystemDirectoryW
GetModuleHandleExW
FreeLibrary
TerminateProcess
ExitProcess
GetModuleHandleW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
InitializeSListHead
GetTickCount64
GetSystemTimeAsFileTime
GetCurrentProcessId
DeleteCriticalSection
InitializeCriticalSectionEx
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcess
Sleep
msvcrt
__set_app_type
_msize
?terminate@@YAXXZ
_XcptFilter
realloc
memset
_controlfp_s
__getmainargs
_except_handler4_common
_amsg_exit
_errno
_environ
__argv
__argc
__p__commode
_set_fmode
_initterm_e
_initterm
__setusermatherr
free
abort
__CxxFrameHandler3
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 168KB - Virtual size: 167KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 848B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
1xDGOhn Size: 292KB - Virtual size: 292KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ