Static task
static1
Behavioral task
behavioral1
Sample
7e86442eddd7cbf96ee555405192e7959da1bcffbae9738f30bc2473bdb19c60.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7e86442eddd7cbf96ee555405192e7959da1bcffbae9738f30bc2473bdb19c60.exe
Resource
win10v2004-20231215-en
General
-
Target
7e86442eddd7cbf96ee555405192e7959da1bcffbae9738f30bc2473bdb19c60.exe.zip
-
Size
18.8MB
-
MD5
83cb7f7e0ff831beab30233e207d1784
-
SHA1
3ec3b8502b17ae7d571dc8d3db7138cdc4cc829c
-
SHA256
b26b604e82540c47421b673d1f60ea430c43e8d5880a7e007606a2150aa5d564
-
SHA512
324c91cb06d00552dab8f31cf2f0c4131789a8bb7d99b79e391ba27fb3cdd510ebd4b94866411646621b54b2781e96957a5edd294cbd9ac4f7552a3c36ecb658
-
SSDEEP
393216:05uCm+ajPKoWRMfeWPe4t+edMdIlWvf3NTpdAF3SrJsIHaDHl:hRKoWR2RAHqlW33hpeBn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/7e86442eddd7cbf96ee555405192e7959da1bcffbae9738f30bc2473bdb19c60.exe
Files
-
7e86442eddd7cbf96ee555405192e7959da1bcffbae9738f30bc2473bdb19c60.exe.zip.zip
Password: infected
-
7e86442eddd7cbf96ee555405192e7959da1bcffbae9738f30bc2473bdb19c60.exe.exe windows:4 windows x86 arch:x86
3b86905964e83a3ff26be77499d69a6f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpiA
lstrcpyA
lstrlenA
_lclose
RemoveDirectoryA
DeleteFileA
GetModuleFileNameA
_lread
_llseek
_lopen
GetDiskFreeSpaceA
SetCurrentDirectoryA
CreateDirectoryA
GetFileAttributesA
lstrcatA
GetTempPathA
GetCurrentDirectoryA
_lwrite
_lcreat
CloseHandle
GetExitCodeProcess
CreateProcessA
ExitProcess
TerminateProcess
GetCurrentProcess
HeapFree
HeapAlloc
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
RtlUnwind
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
GetLastError
WriteFile
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
InterlockedDecrement
InterlockedIncrement
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
MsgWaitForMultipleObjects
PeekMessageA
TranslateMessage
DispatchMessageA
wsprintfA
LoadCursorA
SetCursor
MessageBoxA
Sections
.text Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ