Static task
static1
Behavioral task
behavioral1
Sample
03324d627fb412ba1e60f6e8028ebeb3a2eb214f774413449e3be2b7c74734d5.exe
Resource
win7-20231215-en
General
-
Target
27fd52a7a90a57a561649f80d009c86d.bin
-
Size
301KB
-
MD5
c84afac8b21af4f607226d244f387e2e
-
SHA1
a7a5732ee06424b7268dbec7a2151d915ba88ec9
-
SHA256
3372b67feb317270195bb44e6353f28307ea7af2e71e4b10a5c9b5e081b40b23
-
SHA512
a3cbb71240d1c98fe157736b59e79accdd27f8313ff6046ea489761be6b3feff7c2b19bfe6a00ce1e579dc5dd1b2d5678e232781e1424f90a3a87e6d02cae8c3
-
SSDEEP
6144:trgJ/OdkD5kYO1WyHqX2q2Hn1bpujG+HPH0pR0UAeZzVSf3VVKRnEPlW7MWrQ8Bu:tr5aDQKXn4n1sRv0bRAeZzof3vKVENxt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/03324d627fb412ba1e60f6e8028ebeb3a2eb214f774413449e3be2b7c74734d5.exe
Files
-
27fd52a7a90a57a561649f80d009c86d.bin.zip
Password: infected
-
03324d627fb412ba1e60f6e8028ebeb3a2eb214f774413449e3be2b7c74734d5.exe.exe windows:5 windows x86 arch:x86
Password: infected
9de1b9c92e80f468f131f5e9497519c8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumCalendarInfoA
GlobalAddAtomA
InterlockedIncrement
OpenJobObjectA
GetCurrentProcess
GetModuleHandleW
GetCommConfig
GetProcessHeap
GetWindowsDirectoryA
SizeofResource
EnumResourceLanguagesA
CreateFileW
GetOverlappedResult
ExitThread
GetVolumePathNameA
FlushFileBuffers
InterlockedExchange
GetLastError
SetLastError
GetProcAddress
VirtualAlloc
BackupWrite
GetComputerNameA
LoadLibraryA
OpenMutexA
WriteConsoleA
LocalAlloc
CreateHardLinkW
FindFirstVolumeMountPointW
BeginUpdateResourceA
GlobalFindAtomW
VirtualProtect
_lopen
GetVersionExA
FindAtomW
GetFileInformationByHandle
OpenFileMappingA
TlsFree
LCMapStringW
lstrcpyA
GetFullPathNameW
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
RaiseException
RtlUnwind
HeapFree
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
TerminateProcess
IsDebuggerPresent
HeapAlloc
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
InitializeCriticalSectionAndSpinCount
GetModuleHandleA
LCMapStringA
WideCharToMultiByte
user32
SetClipboardViewer
gdi32
GetDeviceGammaRamp
Sections
.text Size: 298KB - Virtual size: 297KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 87KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ