Static task
static1
Behavioral task
behavioral1
Sample
465c7b3acd3143fa4bdfe6d11907346bcdbdfe5b0797468c3407a81ca84de967.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
465c7b3acd3143fa4bdfe6d11907346bcdbdfe5b0797468c3407a81ca84de967.exe
Resource
win10v2004-20231215-en
General
-
Target
9afaf589e43fcc98ce95624a8ccc9d97.bin
-
Size
5KB
-
MD5
d9caf96e54c32a4baa0cfb566e695032
-
SHA1
65a04009d4c32226b468e271ca4edb1ebceca8c2
-
SHA256
96832ea20728574d6a11bf8ecb735db4522b51be34f4a3ad34078e6a0af0fff0
-
SHA512
cf522c13ab9fd317e4bebf19ba2b692ac44ffecbdb52478f747983bf9549d6978c944bf52a07d3f408342f8d7803a054fc35e893c6231cfd7ddd282b317ef03a
-
SSDEEP
96:5Pwb1OVUWyZK5mmJHfxxn5Uefn30Kid1QJaR5MZJUSc1RncIs5gsXpE6gPtsw:ZO1OVUWEK5RJ/xx5lfRiPfyWhnuWsXpy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/465c7b3acd3143fa4bdfe6d11907346bcdbdfe5b0797468c3407a81ca84de967.exe
Files
-
9afaf589e43fcc98ce95624a8ccc9d97.bin.zip
Password: infected
-
465c7b3acd3143fa4bdfe6d11907346bcdbdfe5b0797468c3407a81ca84de967.exe.exe windows:4 windows x86 arch:x86
Password: infected
46084168b412e051097ae39c055c9320
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetModuleFileNameW
GetModuleHandleW
Sleep
GetLastError
MoveFileW
GetSystemTimeAsFileTime
DeleteFileW
lstrcpyW
lstrlenW
GetEnvironmentVariableW
lstrcmpA
lstrlenA
UnmapViewOfFile
VirtualAlloc
VirtualFree
GetModuleHandleA
VirtualProtect
SetLastError
LoadLibraryA
LoadLibraryExA
lstrcatA
lstrcpyA
GetModuleFileNameA
GetProcAddress
HeapFree
FreeLibrary
HeapAlloc
GetProcessHeap
LoadLibraryW
LoadLibraryExW
lstrcatW
ReadFile
SetFilePointer
MapViewOfFileEx
CloseHandle
MapViewOfFile
CreateFileMappingW
ExitProcess
FormatMessageA
SetEnvironmentVariableW
GetFileSize
CreateFileW
WideCharToMultiByte
lstrcpynW
user32
MessageBoxA
wsprintfW
Sections
.text Size: 24KB - Virtual size: 7.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE