Static task
static1
Behavioral task
behavioral1
Sample
992df99cdbeaf371eac3f8d177127d130a091e5105a541615ba85604d7c150b9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
992df99cdbeaf371eac3f8d177127d130a091e5105a541615ba85604d7c150b9.exe
Resource
win10v2004-20231222-en
General
-
Target
8a2d941f8c748ba39c0509df16d56ac8.bin
-
Size
24KB
-
MD5
e55351074087ef96303be59bcd5401b2
-
SHA1
fd4c574f46b732292afe035b641d55b207c0cb58
-
SHA256
771d9052324460b87826f164c5f18f1627fe441597c7d31c1eb696fbdec539db
-
SHA512
7a4b20664aac3a2ceac74af5237d7c609fa8f0d1fe283417eae8372b37137b775cf922120d9610bf0fe9da393a6ff42e51ef414d55710471900b8ddf3a9b3990
-
SSDEEP
384:+EHfnDqipWeralQhY2cDRSZEmtBGPAmkdkVQPYpLowxWeG97r:1HfnDqsWe6Qa1SZEW8Y3cQPeoDeu7r
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/992df99cdbeaf371eac3f8d177127d130a091e5105a541615ba85604d7c150b9.exe
Files
-
8a2d941f8c748ba39c0509df16d56ac8.bin.zip
Password: infected
-
992df99cdbeaf371eac3f8d177127d130a091e5105a541615ba85604d7c150b9.exe.exe windows:4 windows x86 arch:x86
Password: infected
4e456ad39e5ec56b9659a21c82756a08
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
HttpSendRequestW
InternetConnectW
HttpOpenRequestW
InternetSetPerSiteCookieDecisionW
InternetCloseHandle
InternetAttemptConnect
InternetOpenW
InternetReadFile
InternetClearAllPerSiteCookieDecisions
InternetOpenUrlW
InternetQueryDataAvailable
InternetSetOptionW
shlwapi
StrStrIW
PathMatchSpecW
PathCombineW
wvnsprintfW
StrStrIA
PathRemoveFileSpecW
kernel32
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetVersionExA
GetFileSize
RtlUnwind
WideCharToMultiByte
MultiByteToWideChar
HeapCreate
CopyFileW
CreateThread
WaitForMultipleObjects
DeleteFileW
CreateProcessW
SetUnhandledExceptionFilter
GetLastError
ExitProcess
LoadLibraryW
GetProcAddress
Sleep
VirtualProtect
GetPrivateProfileIntW
ExpandEnvironmentStringsW
GetPrivateProfileStringW
SetFilePointer
SetEndOfFile
HeapAlloc
GetVersionExW
SetWaitableTimer
SystemTimeToFileTime
CreateWaitableTimerW
HeapFree
ReadFile
FindNextFileW
GetModuleFileNameW
WaitForSingleObject
GetTimeZoneInformation
GetFileTime
CreateFileW
CloseHandle
GetTickCount
GetFileSizeEx
VirtualFree
GetProcessHeap
GetCurrentDirectoryW
VirtualAlloc
HeapReAlloc
GetSystemTime
VirtualQuery
FindClose
WriteFile
GetLocalTime
FindFirstFileW
GetModuleHandleW
OpenMutexW
GetCommandLineW
CreateMutexW
user32
GetWindowLongW
DispatchMessageW
GetForegroundWindow
CharLowerW
CreateWindowExW
FindWindowW
PeekMessageW
SetForegroundWindow
GetSystemMetrics
MessageBoxW
SetWindowPos
SetWindowLongW
SetParent
advapi32
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
RegCreateKeyExW
RegEnumKeyExW
shell32
SHGetFolderPathW
ole32
CoCreateInstance
OleInitialize
CoInitialize
oleaut32
SysAllocString
VariantInit
SysFreeString
VariantClear
Sections
.text Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE