Static task
static1
Behavioral task
behavioral1
Sample
b7e8263a9210b8d4b85e957fd5cf0d23626926f7e41c1df3bbe468d12609d6e6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
b7e8263a9210b8d4b85e957fd5cf0d23626926f7e41c1df3bbe468d12609d6e6.exe
Resource
win10v2004-20231215-en
General
-
Target
1a3bb5acfb7f3ee075b7e6bd97243935.bin
-
Size
669KB
-
MD5
507c0b362fb27c14fb11594977e0893f
-
SHA1
cc0c0b4bf0e265b86e38e8ab20f961200b5ea295
-
SHA256
5fbafc9228fec507a203149bb1b3d427a12ff0fd2a9d16a2250a91e54207650a
-
SHA512
2621fe5ddf7d8f1d8e0c3b075db2b0134aad0ce45abf5227bf69418afd43c998a370f2086d1e3c3084084d2795d2777a6843400db1aff50da859661afef1e204
-
SSDEEP
12288:TSBIViJhrlvwPXu5gemZtYbhmfWiUxn9/1MNqO9pFEwiTzEvIMJCTQx8pDkW:KIVW5geCGNqLUx9q7QwiTzaCTk8JkW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/b7e8263a9210b8d4b85e957fd5cf0d23626926f7e41c1df3bbe468d12609d6e6.exe
Files
-
1a3bb5acfb7f3ee075b7e6bd97243935.bin.zip
Password: infected
-
b7e8263a9210b8d4b85e957fd5cf0d23626926f7e41c1df3bbe468d12609d6e6.exe.exe windows:5 windows x86 arch:x86
Password: infected
ae482bd3cfff150c70fe7ca85278d78d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteConsoleOutputCharacterW
GetLocaleInfoA
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
CreateHardLinkA
GetModuleHandleW
GetTickCount
GetConsoleAliasesLengthA
GlobalFindAtomA
WriteConsoleW
GetConsoleFontSize
SetComputerNameExW
GetStartupInfoA
GetLastError
SetThreadContext
GetProcAddress
VirtualAlloc
SetComputerNameA
LoadLibraryA
LocalAlloc
DeleteTimerQueue
AddAtomW
QueryDosDeviceW
lstrcmpiW
FindFirstChangeNotificationA
PurgeComm
DeleteFileW
GetCurrentProcessId
ResetWriteWatch
SuspendThread
FindResourceA
SetLastError
GetComputerNameA
Sleep
ExitProcess
GetStartupInfoW
HeapAlloc
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
WriteFile
GetStdHandle
GetModuleFileNameA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
HeapSize
WideCharToMultiByte
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
RaiseException
gdi32
GetCharABCWidthsFloatA
DeleteMetaFile
shell32
FindExecutableA
Sections
.text Size: 619KB - Virtual size: 619KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 174KB - Virtual size: 173KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ