Static task
static1
Behavioral task
behavioral1
Sample
7f60782c01aa624be6cd210afd00ec3a566c2efbffc659e9cf524ad01114343b.exe
Resource
win7-20231215-en
General
-
Target
a2e34d5b194a4fe390c0af184a51b4b5.bin
-
Size
170KB
-
MD5
b9f9486f9b7c882b7a46b02de27c8061
-
SHA1
3297185016289a5ded093c2a9a6517b1deff2b8d
-
SHA256
28a09887418cf8606735709c09f96ac7ba080238f9523253e018d1058b8b1cf2
-
SHA512
6ec54cc2ea752598e45cd1327ab56b269410eddccd9af4504ecf73a94026c07e1ad6003899bfd60ece3d07283f713a913aac9f7106315d06e7e4c6e2f146a293
-
SSDEEP
3072:l1TbRn8WJz3jH7rWj5pGyU/JMlZtCeXEWa3KKKc8F0EVnAMZD9TRU:lldn3H7rkpGVCTX/Dc8F/zZD9Tm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/7f60782c01aa624be6cd210afd00ec3a566c2efbffc659e9cf524ad01114343b.exe
Files
-
a2e34d5b194a4fe390c0af184a51b4b5.bin.zip
Password: infected
-
7f60782c01aa624be6cd210afd00ec3a566c2efbffc659e9cf524ad01114343b.exe.exe windows:5 windows x86 arch:x86
Password: infected
c89cd92ac8dbdacf8b4528a8c3d9cec4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapReAlloc
SetDefaultCommConfigA
GlobalDeleteAtom
SetPriorityClass
GetConsoleAliasesLengthW
EnumDateFormatsExW
MoveFileExA
SetEndOfFile
CreateNamedPipeW
GetCompressedFileSizeW
GlobalAlloc
LoadLibraryW
ReadConsoleOutputW
GetTimeFormatW
HeapValidate
LocalHandle
GetModuleFileNameW
lstrcatA
CompareStringW
MultiByteToWideChar
CreateJobObjectA
GetConsoleOutputCP
GetLastError
GetLongPathNameA
SetVolumeLabelW
SetComputerNameA
SetTimerQueueTimer
DisableThreadLibraryCalls
BuildCommDCBW
GetTempFileNameA
OpenWaitableTimerA
GetAtomNameA
LoadLibraryA
DnsHostnameToComputerNameA
AddAtomW
GlobalWire
SetConsoleTitleW
GetModuleHandleA
FreeEnvironmentStringsW
VirtualProtect
GetCurrentDirectoryA
QueryPerformanceFrequency
DeleteCriticalSection
LocalFree
SetFileAttributesW
LCMapStringW
CopyFileExA
SetEnvironmentVariableA
CompareStringA
GetTimeZoneInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
FatalAppExitA
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
Sleep
HeapSize
ExitProcess
GetStdHandle
GetModuleFileNameA
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
HeapDestroy
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
VirtualAlloc
RtlUnwind
WriteConsoleA
WriteConsoleW
SetStdHandle
InitializeCriticalSectionAndSpinCount
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LCMapStringA
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
ReadFile
CreateFileA
CloseHandle
GetLocaleInfoW
RaiseException
user32
GetMonitorInfoW
GetDesktopWindow
Sections
.text Size: 201KB - Virtual size: 201KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.guv Size: 512B - Virtual size: 124B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 53KB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ