Static task
static1
Behavioral task
behavioral1
Sample
0893d1762c86124356de6003798d91a0890bed953780a6a7726e326cdd0683b7.exe
Resource
win7-20231129-en
General
-
Target
894d0fcd5813d4d6914038ba3e8e6514.bin
-
Size
363KB
-
MD5
502478aa5c0a34515c78f5ebfddf2a3c
-
SHA1
880f9ea15ec6b931363d20624207b7a4ea4dd364
-
SHA256
29f573aa389006a8412b5f874abc46546f30969558e31c9fdc3720034f0143c3
-
SHA512
f12eebac128d9197ab84fe306faf69d38a11cf0f7a2c9b66762c886eb10a674f4494245c251873194233157b3eed45744f200c08d4fa58d4cc10ab1f3798238c
-
SSDEEP
6144:zN831vB+1H9iCkKZwqpNQqKagTXKDIhGv5qHJQCNBiWE5bW2Osg00J+PJ9/Q1FN7:zN833+19lkZo2qE6DIhegvri1bW2Bg8M
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/0893d1762c86124356de6003798d91a0890bed953780a6a7726e326cdd0683b7.exe
Files
-
894d0fcd5813d4d6914038ba3e8e6514.bin.zip
Password: infected
-
0893d1762c86124356de6003798d91a0890bed953780a6a7726e326cdd0683b7.exe.exe windows:5 windows x86 arch:x86
Password: infected
e08b6c650691684104dbbc6cd6435599
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEndOfFile
HeapAlloc
MoveFileExW
QueryPerformanceCounter
SetComputerNameW
GetTimeFormatA
CreateNamedPipeW
GlobalAlloc
SizeofResource
ReadConsoleOutputW
GetConsoleAliasExesLengthW
LeaveCriticalSection
DnsHostnameToComputerNameW
LocalHandle
GetModuleFileNameW
GetCompressedFileSizeA
lstrcatA
MultiByteToWideChar
CreateJobObjectA
GetLastError
GetLongPathNameA
CopyFileExW
BuildCommDCBW
OpenWaitableTimerA
GetAtomNameA
LoadLibraryA
WritePrivateProfileStringA
SetConsoleOutputCP
AddAtomA
SetConsoleTitleW
GetModuleHandleA
QueryMemoryResourceNotification
FreeEnvironmentStringsW
VirtualProtect
GetCurrentDirectoryA
CompareStringA
DeleteTimerQueueTimer
LocalFree
SetFileAttributesW
SetEnvironmentVariableA
CompareStringW
GetTimeZoneInformation
EnumDateFormatsExW
SetPriorityClass
SetDefaultCommConfigA
SetVolumeLabelA
DisableThreadLibraryCalls
GetTempFileNameW
GetModuleHandleW
Sleep
GetProcAddress
ExitProcess
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EnterCriticalSection
RtlUnwind
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
WriteFile
GetStdHandle
GetModuleFileNameA
DeleteCriticalSection
FatalAppExitA
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
InitializeCriticalSectionAndSpinCount
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
HeapDestroy
VirtualFree
HeapFree
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
VirtualAlloc
HeapReAlloc
CloseHandle
CreateFileA
HeapSize
GetLocaleInfoW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
FlushFileBuffers
ReadFile
GetProcessHeap
RaiseException
user32
GetDesktopWindow
GetMonitorInfoA
advapi32
GetServiceKeyNameA
ReadEventLogW
GetPrivateObjectSecurity
EqualSid
QueryServiceLockStatusW
Sections
.text Size: 382KB - Virtual size: 382KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 417B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.wiv Size: 1024B - Virtual size: 577B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ