Static task
static1
Behavioral task
behavioral1
Sample
63b91b11bd0c8e3e659232e5eae8e369a9070da6c4ebb15fe8165f0f124e3e18.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
63b91b11bd0c8e3e659232e5eae8e369a9070da6c4ebb15fe8165f0f124e3e18.exe
Resource
win10v2004-20231215-en
General
-
Target
94c9c928366193a7f9412d550e20f6bb.bin
-
Size
166KB
-
MD5
59a3c220f2fdb0bf663b325fc53c59cb
-
SHA1
f8881958ba7828f336447f18b32ea328f921f676
-
SHA256
d9888e0066ef91aac6c5a3473c3c4d516a261f4d069c84e719b709ccd82e8935
-
SHA512
b44777bbfc559394c13ad8e4efe6611aaa9249ba8dce320790b9be4f63b421950b21b944dfbd76e77084639d6e138150ddbfb31ffd128f25b8e16f91a1c7e70a
-
SSDEEP
3072:6alLaEon2qC27/nJQ5y3edKEfIkTPfsGF6NuISAPU/a33KhQJCvEHeXE4IV0g:6alORbFQ5yOUEw2PfsGkNdSAMy3rKhwP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/63b91b11bd0c8e3e659232e5eae8e369a9070da6c4ebb15fe8165f0f124e3e18.exe
Files
-
94c9c928366193a7f9412d550e20f6bb.bin.zip
Password: infected
-
63b91b11bd0c8e3e659232e5eae8e369a9070da6c4ebb15fe8165f0f124e3e18.exe.exe windows:5 windows x86 arch:x86
Password: infected
c89cd92ac8dbdacf8b4528a8c3d9cec4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapReAlloc
SetDefaultCommConfigA
GlobalDeleteAtom
SetPriorityClass
GetConsoleAliasesLengthW
EnumDateFormatsExW
MoveFileExA
SetEndOfFile
CreateNamedPipeW
GetCompressedFileSizeW
GlobalAlloc
LoadLibraryW
ReadConsoleOutputW
GetTimeFormatW
HeapValidate
LocalHandle
GetModuleFileNameW
lstrcatA
CompareStringW
MultiByteToWideChar
CreateJobObjectA
GetConsoleOutputCP
GetLastError
GetLongPathNameA
SetVolumeLabelW
SetComputerNameA
SetTimerQueueTimer
DisableThreadLibraryCalls
BuildCommDCBW
GetTempFileNameA
OpenWaitableTimerA
GetAtomNameA
LoadLibraryA
DnsHostnameToComputerNameA
AddAtomW
GlobalWire
SetConsoleTitleW
GetModuleHandleA
FreeEnvironmentStringsW
VirtualProtect
GetCurrentDirectoryA
QueryPerformanceFrequency
DeleteCriticalSection
LocalFree
SetFileAttributesW
LCMapStringW
CopyFileExA
SetEnvironmentVariableA
CompareStringA
GetTimeZoneInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
FatalAppExitA
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
Sleep
HeapSize
ExitProcess
GetStdHandle
GetModuleFileNameA
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
HeapDestroy
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
VirtualAlloc
RtlUnwind
WriteConsoleA
WriteConsoleW
SetStdHandle
InitializeCriticalSectionAndSpinCount
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LCMapStringA
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
ReadFile
CreateFileA
CloseHandle
GetLocaleInfoW
RaiseException
user32
GetMonitorInfoW
GetDesktopWindow
Sections
.text Size: 198KB - Virtual size: 197KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dum Size: 512B - Virtual size: 124B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 53KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ