Static task
static1
Behavioral task
behavioral1
Sample
86eb8463ec2014ce7674ee2af8717aa2804ca5de900fb398c09fb38b247cde48.exe
Resource
win7-20231215-en
General
-
Target
a5030bf3ba6dabbcacc3695cd3d0ea68.bin
-
Size
531KB
-
MD5
c90e1f0cc0a97608fa85b27fa35ed41b
-
SHA1
337003dd6017f4dd3e57b5f4eaa9288d40633d4c
-
SHA256
d38715b46a2be8ff5ad6f555f0d03a5f9db286a057f69745d7df984ed3124cfa
-
SHA512
4bea2241eb37ac4f9281013d56fa8d471869905e78b35bdc617be6907b725c4279d9b240becdb7417bdcf38e03aa85a80b9153d444b990ced2da83bc62554679
-
SSDEEP
12288:xjq1ZmgEWI32S1YIPT7BS7i5hzJHukJhbuR7Amug3y+qIejb4xdnSmXk3+:R8yV32SxPTt6QhzJHvpu7hRejsrSmv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/86eb8463ec2014ce7674ee2af8717aa2804ca5de900fb398c09fb38b247cde48.exe
Files
-
a5030bf3ba6dabbcacc3695cd3d0ea68.bin.zip
Password: infected
-
86eb8463ec2014ce7674ee2af8717aa2804ca5de900fb398c09fb38b247cde48.exe.exe windows:5 windows x86 arch:x86
Password: infected
b406d87678b18a8b4647eea357d6d54f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
lstrlenA
Sleep
CloseHandle
HeapAlloc
GetProcAddress
ExitProcess
GetCurrentProcessId
GetProcessHeap
GetCurrentProcess
CheckRemoteDebuggerPresent
RaiseException
LoadLibraryExW
GetSystemDirectoryW
GetLastError
LCIDToLocaleName
GetModuleHandleExW
FreeLibrary
RtlUnwind
VirtualQuery
IsDebuggerPresent
HeapFree
GetStartupInfoW
InitializeSListHead
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetModuleHandleW
GetSystemTimeAsFileTime
LCMapStringEx
MultiByteToWideChar
GetLocaleInfoEx
DecodePointer
EncodePointer
DeleteCriticalSection
InitializeCriticalSectionEx
LeaveCriticalSection
EnterCriticalSection
QueryPerformanceCounter
WideCharToMultiByte
GetNativeSystemInfo
GetCurrentThreadId
GetModuleFileNameW
user32
MessageBoxA
IsDialogMessageA
ShowWindow
DispatchMessageA
GetMessageA
TranslateMessage
FindWindowA
CreateDialogParamA
advapi32
GetUserNameA
ntdll
NtUnmapViewOfSection
msvcrt
_ismbblead
_acmdln
_fmode
?_set_new_mode@@YAHH@Z
_msize
_control87
_isatty
_fileno
log10
ceil
_clearfp
_wcsdup
___lc_handle_func
_lseeki64
_iob
_unlock
_lock
strtol
__p__commode
_initterm
malloc
_callnewh
tolower
wcslen
strlen
calloc
abort
islower
___mb_cur_max_func
_errno
___lc_codepage_func
isupper
__pctype_func
ungetc
setvbuf
fsetpos
fread
fgetpos
fgetc
fflush
fclose
frexp
free
_time64
strcspn
rand
srand
__getmainargs
_amsg_exit
__CxxFrameHandler
memchr
memset
memmove
memcpy
_CxxThrowException
_wsplitpath
__set_app_type
_XcptFilter
realloc
?terminate@@YAXXZ
strchr
wcsrchr
strrchr
Sections
.text Size: 155KB - Virtual size: 155KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 38.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 543KB - Virtual size: 542KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
fjhuy76 Size: 107KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ