Static task
static1
Behavioral task
behavioral1
Sample
096f1efe5d48906704852cbf6952abde0b798d38885b657c175a4b5c9ea5abd2.exe
Resource
win7-20231020-en
General
-
Target
096f1efe5d48906704852cbf6952abde0b798d38885b657c175a4b5c9ea5abd2.zip
-
Size
148KB
-
MD5
7cca583a5d861087eacca974cdf40f57
-
SHA1
3b65e0a65c3d58cb3493da1d61cf87eb49ba5248
-
SHA256
03b52063a94dfc601bbc3f36a137b9acb46bf484002a5e5c40a96cfaf93fcea4
-
SHA512
65f4f7955501f3063cca1450edc46760ed84b81e1fe65f08cd08af485f7dd8089e708edcffa987e5fb03e7a2be197775e425d62c3bfa1a058b2b491d8b97d41b
-
SSDEEP
3072:eJe/LV4H25bjFR1qJHACEtf6x3wSkUkrgqlbBKGNx6sK6d3/4Ry:P/Lg2hFz6HWIxAVUkrgq5Br6Kdv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/096f1efe5d48906704852cbf6952abde0b798d38885b657c175a4b5c9ea5abd2
Files
-
096f1efe5d48906704852cbf6952abde0b798d38885b657c175a4b5c9ea5abd2.zip.zip
Password: infected
-
096f1efe5d48906704852cbf6952abde0b798d38885b657c175a4b5c9ea5abd2.exe windows:5 windows x86 arch:x86
7c1db49ad6667947e0650b5a549f4e65
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsGetValue
SetLocalTime
FindResourceW
GlobalAddAtomA
GetConsoleAliasA
InitializeSListHead
CreateJobObjectW
SetComputerNameW
GetModuleHandleW
CreateNamedPipeW
GetConsoleAliasesA
GetPrivateProfileStringW
GetWindowsDirectoryA
GetGeoInfoW
LoadLibraryW
ReadConsoleInputA
GetSystemWindowsDirectoryA
GetConsoleAliasExesLengthW
GetNamedPipeInfo
CreateFileW
GetVolumePathNameA
GetLastError
GetComputerNameA
GetProcAddress
VirtualAlloc
EnumDateFormatsExA
SearchPathA
OpenWaitableTimerA
LocalAlloc
CreateFileMappingW
SetConsoleDisplayMode
GetNumberFormatW
RemoveDirectoryW
SetConsoleWindowInfo
GetSystemInfo
GlobalFindAtomW
FindFirstVolumeMountPointA
FreeEnvironmentStringsW
EndUpdateResourceA
ReadConsoleInputW
GetWindowsDirectoryW
GetCurrentProcessId
DebugActiveProcess
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
Sleep
ExitProcess
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
WriteFile
GetStdHandle
GetModuleFileNameA
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapAlloc
HeapFree
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
CloseHandle
LoadLibraryA
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
HeapReAlloc
GetModuleHandleA
SetFilePointer
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetStdHandle
FlushFileBuffers
HeapSize
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
CreateFileA
user32
GetMessageExtraInfo
CharToOemBuffA
gdi32
GetCharWidth32A
GetCharABCWidthsFloatW
Sections
.text Size: 190KB - Virtual size: 189KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 714KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 54KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ