Static task
static1
Behavioral task
behavioral1
Sample
ed521f9314ec81688174f7c3b29e128339bf7586e930b1dca76a8e165b9cb5b5.exe
Resource
win7-20231215-en
General
-
Target
46b15a02a32f9a1e2d8c891ef42aad81.bin
-
Size
181KB
-
MD5
9ecf2f367db4afb6bde9cd464d675254
-
SHA1
bc720c7aea3cbd96508cf7a4b444f57fcc78b7d3
-
SHA256
8855424a5cb1b43870101afc5162da00ed3d14b98ba9f4f4be300d833279b742
-
SHA512
43664fd6109503bbe0c2c68e43078e5288e868060096c310e05e50d45b0c9cdea4ffba3c88b512ffb3f5c024e4aed722bcdf07732125ba39c0ab1ed2da45aa46
-
SSDEEP
3072:XLmw27cZrzyzp8E0a84CHMncJKlVhj4mPRnV5HpAcbi4bS77O4K3xQ/L/78ZYJHV:731yPWDH0cwDh04np5e4bVBQDg2JHJaC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/ed521f9314ec81688174f7c3b29e128339bf7586e930b1dca76a8e165b9cb5b5.exe
Files
-
46b15a02a32f9a1e2d8c891ef42aad81.bin.zip
Password: infected
-
ed521f9314ec81688174f7c3b29e128339bf7586e930b1dca76a8e165b9cb5b5.exe.exe windows:5 windows x86 arch:x86
Password: infected
a2a0817e6392d97a0384682bfc79e3d7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalUnlock
SetDefaultCommConfigA
GlobalDeleteAtom
OpenFile
GetConsoleAliasesLengthW
EnumDateFormatsExW
CopyFileExW
MoveFileExA
SetEndOfFile
WriteConsoleOutputW
CreateJobObjectW
HeapFree
GlobalAlloc
LoadLibraryW
IsProcessInJob
DnsHostnameToComputerNameW
GetTimeFormatW
GetModuleFileNameW
GetCompressedFileSizeA
lstrcatA
SetConsoleTitleA
VirtualUnlock
LCMapStringA
FreeLibraryAndExitThread
GetLastError
ChangeTimerQueueTimer
GetLongPathNameW
HeapSize
CreateNamedPipeA
SetVolumeLabelW
GetConsoleDisplayMode
EnterCriticalSection
SetFileAttributesA
BuildCommDCBW
GetTempFileNameA
GetAtomNameA
LoadLibraryA
OpenWaitableTimerW
GetModuleHandleA
FreeEnvironmentStringsW
VirtualProtect
CompareStringA
QueryPerformanceFrequency
DeleteCriticalSection
LocalFree
SetEnvironmentVariableA
CompareStringW
GetTimeZoneInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
LeaveCriticalSection
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
FatalAppExitA
GetModuleHandleW
Sleep
GetProcAddress
ExitProcess
GetStdHandle
GetModuleFileNameA
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
VirtualAlloc
HeapReAlloc
RtlUnwind
MultiByteToWideChar
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
InitializeCriticalSectionAndSpinCount
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
ReadFile
CreateFileA
CloseHandle
GetLocaleInfoW
RaiseException
user32
GetMonitorInfoW
GetDesktopWindow
Sections
.text Size: 193KB - Virtual size: 193KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zogoj Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ