Static task
static1
Behavioral task
behavioral1
Sample
11d22d4281f0d9b237379e7bc5b2f301ae94f9028d94d043cefe1c08636ce9fd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
11d22d4281f0d9b237379e7bc5b2f301ae94f9028d94d043cefe1c08636ce9fd.exe
Resource
win10v2004-20231215-en
General
-
Target
cc6e4705b5dd5aabaf9378883a692ff8.bin
-
Size
199KB
-
MD5
8b909561dbe5721470644332aec13907
-
SHA1
352b5d0bc859fb06fcb007d8dac219e15965c136
-
SHA256
dbc84ad2bd711fc4693c904eea538fafc2d10b8b2421481754d88fed1bc091af
-
SHA512
11daad43e9c2736a8784bb04fb6de4845a2c34a8d64256a97f90a8d4eac45bd3a8018072f5d3088f05481120e3073e775a31ccd991b35141d7df46703e624fac
-
SSDEEP
3072:UxSYFt8rFBln6/eyIyFPu3fANLQEtGbksnBeTPBdARno/yHzW5+U98o3xhuFQkim:UxSYFtAdzyFPuvktPBUKtVRhu6kXSY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/11d22d4281f0d9b237379e7bc5b2f301ae94f9028d94d043cefe1c08636ce9fd.exe
Files
-
cc6e4705b5dd5aabaf9378883a692ff8.bin.zip
Password: infected
-
11d22d4281f0d9b237379e7bc5b2f301ae94f9028d94d043cefe1c08636ce9fd.exe.exe windows:5 windows x86 arch:x86
Password: infected
7b1df25cb3b9a53041bb12b024d69535
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalUnlock
TlsGetValue
HeapFree
FreeEnvironmentStringsA
GetModuleHandleW
GetConsoleAliasesA
LoadLibraryW
GetLocaleInfoW
GetAtomNameW
CompareStringW
LCMapStringA
GetConsoleOutputCP
GetLastError
GetProcAddress
GetLongPathNameA
CreateNamedPipeA
SetComputerNameA
OpenWaitableTimerA
LoadLibraryA
LocalAlloc
SetCurrentDirectoryW
VirtualLock
FindAtomA
GetModuleFileNameA
CreateWaitableTimerW
DebugBreakProcess
DeleteCriticalSection
LocalFree
SetFileAttributesW
GetStartupInfoW
RaiseException
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
Sleep
HeapSize
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
InitializeCriticalSectionAndSpinCount
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
WideCharToMultiByte
LCMapStringW
GetTimeZoneInformation
CompareStringA
SetEnvironmentVariableA
Sections
.text Size: 212KB - Virtual size: 212KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kakapez Size: 512B - Virtual size: 124B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 417B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ