Static task
static1
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
TEAMER~1.exe
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
TEAMER~1.exe
Resource
win10v2004-20231215-en
General
-
Target
7350e03b8abf41399dbf7b0b693d3932
-
Size
87KB
-
MD5
7350e03b8abf41399dbf7b0b693d3932
-
SHA1
6eeb85fafa7c514f324c426aedc981a4b577066c
-
SHA256
6cc7e52397fc3774ffd599ff5d3d1590bc012cf49df49967188cccf80b93e81d
-
SHA512
ed38339c21c1c648a004dbc3369e541b3c1ce044146832e89e1f24b139f09c68a234e7fa3026a033ac608c89c638925be4c9044226368df40ddbc108bd1720d9
-
SSDEEP
1536:18TQzJJe0uFFD4evdVmCoSL8IQ4jQrG3NSAB4rbBxmR6wXh+RPr:1W/FhmS3jDNK90oOsRPr
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/1.exe unpack001/TEAMER~1.EXE
Files
-
7350e03b8abf41399dbf7b0b693d3932.cab
-
1.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 512B - Virtual size: 164B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 2KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 956B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 89KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
TEAMER~1.EXE.exe windows:4 windows x86 arch:x86
6efdf60df3e294438a907f9bdf3f9442
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CopyFileA
CreateFileA
CreateThread
DeviceIoControl
ExitProcess
GetCurrentDirectoryA
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileIntA
GetPrivateProfileStringA
GetProcAddress
GetTickCount
GetVersionExA
IsDebuggerPresent
ReadFile
Sleep
VirtualAlloc
VirtualFree
VirtualProtect
WriteFile
wsock32
gethostbyname
WSAStartup
WSACleanup
user32
MessageBoxA
Sections
.text Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 778B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE