Static task
static1
Behavioral task
behavioral1
Sample
252850b3ba00d2467c4388bc99ce5c14abc78c21aba87062760bbb3d9aaf1df8.exe
Resource
win7-20231215-en
General
-
Target
b24cd81963b57556ae1bd102ca8ee22a.bin
-
Size
363KB
-
MD5
7e2a8ef5296d8a6c51e2f19e55a77275
-
SHA1
09fb741825dffe34a26fe8e19e780a7119fc84fe
-
SHA256
c93a34acd8bcd740b16b906d86e597f51019edb36bc3d99f1e491cc82345752c
-
SHA512
3fd6de09865860dbee513aa4eb1061cf270c52eff0d2eb529f740a803c9188a297de2c745642b08365d9c50b8618bda210b27a3f68216d6ad31dee24fb82ee8c
-
SSDEEP
6144:TrJASbhjOxyYjVjWFTmD9M93tzN8kfCV/ZdZmLKKmUcit1aWgLp/y6yXfP3Rf04:TVbujaQM93ZN8kfW/XZmGKjc6oXyX3W4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/252850b3ba00d2467c4388bc99ce5c14abc78c21aba87062760bbb3d9aaf1df8.exe
Files
-
b24cd81963b57556ae1bd102ca8ee22a.bin.zip
Password: infected
-
252850b3ba00d2467c4388bc99ce5c14abc78c21aba87062760bbb3d9aaf1df8.exe.exe windows:5 windows x86 arch:x86
Password: infected
c53bec305cc1884e216bd3a89a153eba
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetDefaultCommConfigW
QueryPerformanceCounter
CancelWaitableTimer
GetCompressedFileSizeW
CancelDeviceWakeupRequest
GlobalAlloc
SetSystemTimeAdjustment
ReadConsoleOutputW
GetConsoleAliasExesLengthW
LeaveCriticalSection
GetModuleFileNameW
MultiByteToWideChar
SetConsoleTitleA
DeactivateActCtx
CreateJobObjectA
GetLastError
GetCurrentDirectoryW
GetLongPathNameW
EnumDateFormatsExA
SetVolumeLabelW
MoveFileExW
DisableThreadLibraryCalls
OpenWaitableTimerA
GetAtomNameA
LoadLibraryA
DnsHostnameToComputerNameA
WritePrivateProfileStringA
SetConsoleOutputCP
AddAtomA
GetModuleHandleA
QueryMemoryResourceNotification
lstrcatW
FreeEnvironmentStringsW
BuildCommDCBA
VirtualProtect
SetFileShortNameA
DeleteTimerQueueTimer
LocalFree
SetEnvironmentVariableA
CompareStringW
CompareStringA
WriteConsoleOutputCharacterA
SetEndOfFile
CopyFileExW
SetPriorityClass
SetFileAttributesA
GetTempFileNameW
GetModuleHandleW
Sleep
GetProcAddress
ExitProcess
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
EnterCriticalSection
RtlUnwind
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
WriteFile
GetStdHandle
GetModuleFileNameA
DeleteCriticalSection
FatalAppExitA
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
InitializeCriticalSectionAndSpinCount
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
HeapDestroy
VirtualFree
HeapFree
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
VirtualAlloc
HeapReAlloc
CloseHandle
CreateFileA
HeapSize
GetLocaleInfoW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
FlushFileBuffers
ReadFile
GetProcessHeap
GetTimeZoneInformation
RaiseException
user32
GetDesktopWindow
GetMonitorInfoA
advapi32
ReadEventLogW
GetPrivateObjectSecurity
EqualSid
GetServiceKeyNameW
PrivilegedServiceAuditAlarmW
Sections
.text Size: 382KB - Virtual size: 382KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 417B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zuyawu Size: 1024B - Virtual size: 577B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ