Static task
static1
Behavioral task
behavioral1
Sample
bbf35930603e2c79b466e38f249939ec19d6e8b8875868a03a607a92f39c62fb.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
bbf35930603e2c79b466e38f249939ec19d6e8b8875868a03a607a92f39c62fb.exe
Resource
win10v2004-20231023-en
General
-
Target
3a0fc46ee9891365b4e1290c67985d50.bin
-
Size
145KB
-
MD5
5527b3f44336a62fc66af96bb34cca15
-
SHA1
89fca136f8ed707cd94cb7c30795320b71e5a722
-
SHA256
2b6fb357a51bc3c6527344d6e7cf059d8ca8467ee5a2c2e3e88398c466445d11
-
SHA512
4b7b1d521f5aeec187a2d9a8aa94481dae11dd55906a437c69d93b255522948a9459a54edc73e348cfcda6b5b7fdc7ffb963b89e11120e3c9e4f4b9b5c687b69
-
SSDEEP
3072:2KTvfq4y/XXgrQeKk6+KvGMnTnGspLsU8EJ89cvtEoIlEOpmqvEU7NYK8:2KTvyjXKgk6J+M7ppLs7cVQm2/NYj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/bbf35930603e2c79b466e38f249939ec19d6e8b8875868a03a607a92f39c62fb.exe
Files
-
3a0fc46ee9891365b4e1290c67985d50.bin.zip
Password: infected
-
bbf35930603e2c79b466e38f249939ec19d6e8b8875868a03a607a92f39c62fb.exe.exe windows:5 windows x86 arch:x86
Password: infected
bd153cb170efdbdb1b1268a5a173f793
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
EnumDateFormatsExW
TlsGetValue
SetLocalTime
FindResourceW
GlobalAddAtomA
InitializeSListHead
CreateJobObjectW
SetComputerNameW
GetModuleHandleW
CreateNamedPipeW
GetConsoleAliasesA
GetPrivateProfileStringW
GetGeoInfoW
LoadLibraryW
ReadConsoleInputA
GetConsoleWindow
GetSystemWindowsDirectoryA
GetConsoleAliasExesLengthW
GetNamedPipeInfo
GetVolumePathNameA
GetLastError
GetComputerNameA
GetProcAddress
VirtualAlloc
SearchPathA
OpenWaitableTimerA
LocalAlloc
CreateFileMappingW
GetNumberFormatW
RemoveDirectoryW
SetConsoleWindowInfo
GetSystemInfo
GlobalFindAtomW
FindFirstVolumeMountPointA
FreeEnvironmentStringsW
SetCalendarInfoA
EndUpdateResourceA
ReadConsoleInputW
GetWindowsDirectoryW
GetCurrentProcessId
AddConsoleAliasA
DebugActiveProcess
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
Sleep
ExitProcess
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
WriteFile
GetStdHandle
GetModuleFileNameA
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapAlloc
HeapFree
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
CloseHandle
LoadLibraryA
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
HeapReAlloc
GetModuleHandleA
SetFilePointer
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetStdHandle
FlushFileBuffers
HeapSize
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
GetMessageExtraInfo
CharToOemBuffA
gdi32
GetCharWidth32A
GetCharABCWidthsFloatW
Sections
.text Size: 189KB - Virtual size: 189KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 714KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ