Static task
static1
Behavioral task
behavioral1
Sample
30a9d7693abc1c832d022cd7e59dc360acd119c27036b2c49d7b26e01e7609c8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
30a9d7693abc1c832d022cd7e59dc360acd119c27036b2c49d7b26e01e7609c8.exe
Resource
win10v2004-20231215-en
General
-
Target
30a9d7693abc1c832d022cd7e59dc360acd119c27036b2c49d7b26e01e7609c8.exe.zip
-
Size
31KB
-
MD5
32ad574d7cd9eee1d5a08203329be830
-
SHA1
38976e5763fa5c1fa5b40a43004928b6e8cffa98
-
SHA256
e8c9edc97b00af2fd69fb299eecfb8cbc00e2fd0bc1fa48a2565f71d8738dd83
-
SHA512
2e94850a064070bb2d457ea906ac678d09eb3be92c4391ff424470b05ae7e111f85f1cead1b9c5b71fa56d7316533553b7c08720265f372d200523041af0b023
-
SSDEEP
768:ip/+xmEJE5mj0WBK6mHWYoQ5rH8N5htJZQromY:hxAmGHWuB8N/yrS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/30a9d7693abc1c832d022cd7e59dc360acd119c27036b2c49d7b26e01e7609c8.exe
Files
-
30a9d7693abc1c832d022cd7e59dc360acd119c27036b2c49d7b26e01e7609c8.exe.zip.zip
Password: infected
-
30a9d7693abc1c832d022cd7e59dc360acd119c27036b2c49d7b26e01e7609c8.exe.exe windows:4 windows x86 arch:x86
817ba6863ea361b46ad51f6d64ce5e28
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
__WSAFDIsSet
select
listen
getsockname
recvfrom
accept
WSASetLastError
socket
setsockopt
bind
connect
htons
getservbyport
ntohs
getservbyname
inet_addr
gethostbyname
inet_ntoa
gethostbyaddr
WSAGetLastError
WSAStartup
WSACleanup
closesocket
recv
send
kernel32
GetCommandLineA
CreateFileA
GetNumberOfConsoleInputEvents
PeekConsoleInputA
LCMapStringW
LCMapStringA
GetSystemInfo
VirtualProtect
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
HeapSize
SetStdHandle
SetFilePointer
SetEnvironmentVariableA
GetOEMCP
GetACP
CompareStringW
GetCPInfo
MultiByteToWideChar
CompareStringA
VirtualQuery
GetLastError
CloseHandle
CreateProcessA
DuplicateHandle
GetCurrentProcess
ExitThread
Sleep
ReadFile
PeekNamedPipe
WriteFile
CreatePipe
DisconnectNamedPipe
TerminateProcess
WaitForMultipleObjects
TerminateThread
CreateThread
GetStdHandle
FreeConsole
ExitProcess
HeapFree
HeapAlloc
GetProcAddress
GetModuleHandleA
GetSystemTimeAsFileTime
SetEndOfFile
GetVersionExA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetModuleFileNameA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
WideCharToMultiByte
SetHandleCount
GetFileType
GetStartupInfoA
FlushFileBuffers
RtlUnwind
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
LoadLibraryA
InterlockedExchange
Sections
.text Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 4KB - Virtual size: 68B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE