Static task
static1
Behavioral task
behavioral1
Sample
099ef99582cb2da5e520888d90b4171d6987ac87d7fc00e8219b25f1c4e6884f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
099ef99582cb2da5e520888d90b4171d6987ac87d7fc00e8219b25f1c4e6884f.exe
Resource
win10v2004-20231215-en
General
-
Target
76433c7640e0aaee3cce8dacb5d3828c.bin
-
Size
170KB
-
MD5
a0d96d99c1c5b176c506c3ba9225ad1a
-
SHA1
adc20eb510e0b8ad92029617876dbc44e9a63191
-
SHA256
ad0a24464f71c6c7fe084cb5452427e1254ba47ca1346fe4a9f32226f49c8849
-
SHA512
18f05c881591fad8e3d90d047d11844c05ff901bdc89f6b73916bc86cf314d846ce0aa334162472c6cef941501a9cae17c6a21aa0b4d6d6bf2b186782b95026b
-
SSDEEP
3072:7lkszltA9IeHYa72H0TJlxCZiHUyt1MjGxWd9NIkrqdXd0c9mB38/GK:pbA9IB7H0t4+Uyt1kX6dN0Yma/GK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/099ef99582cb2da5e520888d90b4171d6987ac87d7fc00e8219b25f1c4e6884f.exe
Files
-
76433c7640e0aaee3cce8dacb5d3828c.bin.zip
Password: infected
-
099ef99582cb2da5e520888d90b4171d6987ac87d7fc00e8219b25f1c4e6884f.exe.exe windows:5 windows x86 arch:x86
Password: infected
e0dc07002fbf5e2ad2a1116b5c525f81
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
FindFirstChangeNotificationW
EnumCalendarInfoA
GetConsoleAliasesLengthW
EndUpdateResourceW
InterlockedIncrement
GetCurrentProcess
SetComputerNameW
GetComputerNameW
OpenSemaphoreA
BackupSeek
GetModuleHandleW
GetProcessHeap
LoadLibraryW
SizeofResource
GetSystemWindowsDirectoryA
Beep
GetVolumePathNameA
LCMapStringA
InterlockedExchange
OpenMutexW
GetLastError
SetLastError
GetFullPathNameA
VirtualAlloc
BeginUpdateResourceW
LoadLibraryA
CreateFileMappingA
LocalAlloc
FindFirstVolumeMountPointW
FindAtomA
GlobalFindAtomW
CreateIoCompletionPort
RequestDeviceWakeup
VirtualProtect
SetCalendarInfoA
GetVersionExA
TerminateJobObject
EnumResourceLanguagesW
GlobalAddAtomW
OpenFileMappingA
TlsFree
GetProcAddress
GetComputerNameA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
Sleep
ExitProcess
GetStartupInfoW
RaiseException
RtlUnwind
WriteFile
GetStdHandle
GetModuleFileNameA
GetCPInfo
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TerminateProcess
IsDebuggerPresent
HeapAlloc
HeapFree
HeapSize
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapReAlloc
GetModuleHandleA
user32
IsWindowEnabled
gdi32
GetDeviceGammaRamp
Sections
.text Size: 151KB - Virtual size: 150KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 114KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ