Static task
static1
Behavioral task
behavioral1
Sample
fe0e4c50be9f869022a72d53735dbf8603beda1f493fe2d98c531f5b4403e777.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
fe0e4c50be9f869022a72d53735dbf8603beda1f493fe2d98c531f5b4403e777.exe
Resource
win10v2004-20231215-en
General
-
Target
fe0e4c50be9f869022a72d53735dbf8603beda1f493fe2d98c531f5b4403e777.exe.zip
-
Size
58KB
-
MD5
0ebbc453b6741edb2b155cd7729d7f97
-
SHA1
8b4c6df573b4cd5c5099ee77e477e5e9947100b3
-
SHA256
bb8c1d97347bf0f016d57b40bd945da95f2d07b0610daafc133872eb27c526cd
-
SHA512
231618107b69bdaefcd3c8c98e7e9d2aaf0c5580f4bd19739c8a0d43886b33eba200ebb0a84217396b52f5525d4a884832a7c1d7e6db29ed57b33b07c6f2dc4a
-
SSDEEP
1536:hdOTudHti6PJAe/IaPDeF0G+Y/I1+2cbcLKVwUb4oOi2p35hzeNtYB:hdOTudHtJzIa++X+2cbcLpK4oOZ3XeNa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/fe0e4c50be9f869022a72d53735dbf8603beda1f493fe2d98c531f5b4403e777.exe
Files
-
fe0e4c50be9f869022a72d53735dbf8603beda1f493fe2d98c531f5b4403e777.exe.zip.zip
Password: infected
-
fe0e4c50be9f869022a72d53735dbf8603beda1f493fe2d98c531f5b4403e777.exe.exe windows:5 windows x86 arch:x86
dc73a9bd8de0fd640549c85ac4089b87
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
ExitProcess
FindResourceA
FreeLibrary
GetModuleHandleA
GetProcAddress
GetTempPathA
LoadLibraryA
LoadResource
RtlMoveMemory
SizeofResource
VirtualAlloc
lstrcatA
CloseHandle
CreateFileA
FlushFileBuffers
WriteFile
Sections
.text Size: 512B - Virtual size: 502B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 472B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 82B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ