Static task
static1
Behavioral task
behavioral1
Sample
1331904161.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1331904161.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
վ.url
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
վ.url
Resource
win10v2004-20231215-en
General
-
Target
1951baf498a18c0fce8b1cf4fe261f70
-
Size
27KB
-
MD5
1951baf498a18c0fce8b1cf4fe261f70
-
SHA1
949b5c056b69b569eb1abfb85ecca33bdf2f217f
-
SHA256
48ab937cc2b055ab739781392ecff3db49e4213c489e0f2e15c28b11fe14eb82
-
SHA512
c92e735803145bda66cef07e503deaa00d6fcdeec981c3fde8574a6aa1f6f2716106fddfef52249d5dc2ff4438aa4031313bb421e134ab32f1333b57df62f98b
-
SSDEEP
384:plFa5U3dhAJ1jI33p9A/yeyJxJiyWGV04Efs5DeAy0AzMrf8kji40q5W9TmcqzW5:bF4UErjAxeyJuOV0mC7Vkjl5W9wWWMdR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/1331904161.exe
Files
-
1951baf498a18c0fce8b1cf4fe261f70.zip
-
1331904161.exe.exe windows:4 windows x86 arch:x86
df618eb1f0f1c5693ddd41cfb904a8f5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
ReadFile
SetEndOfFile
GlobalAlloc
DeleteFileA
GlobalFree
InterlockedIncrement
InterlockedDecrement
LoadLibraryA
GetProcAddress
GetOEMCP
GetACP
GetCPInfo
CreateFileA
SetFilePointer
FlushFileBuffers
SetStdHandle
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
WriteFile
GetLastError
ResumeThread
CreateThread
TlsSetValue
TlsGetValue
ExitThread
CloseHandle
HeapAlloc
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapFree
GetCurrentThreadId
TlsAlloc
SetLastError
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
RtlUnwind
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
user32
GetWindowTextA
EndPaint
LoadImageA
BeginPaint
EndDialog
DialogBoxParamA
InvalidateRect
GetDlgItemTextA
SetWindowPos
wsprintfA
GetDlgItem
SetDlgItemTextA
UpdateWindow
SendMessageA
LoadIconA
MessageBoxA
gdi32
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
GetObjectA
shell32
ShellExecuteA
ws2_32
recv
send
closesocket
connect
htons
socket
gethostbyname
WSAStartup
WSACleanup
wininet
InternetOpenA
InternetReadFile
FindNextUrlCacheEntryA
FindCloseUrlCache
FindFirstUrlCacheEntryA
InternetCloseHandle
InternetGetCookieA
InternetOpenUrlA
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
վ.url
-
.txt