Static task
static1
Behavioral task
behavioral1
Sample
8518533444f9d26fabdd17053c4e69df268c6f3d3ef8be30fd2ab649641b6343.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8518533444f9d26fabdd17053c4e69df268c6f3d3ef8be30fd2ab649641b6343.exe
Resource
win10v2004-20231215-en
General
-
Target
560413121810458b463f81c6dd92268c.bin
-
Size
107KB
-
MD5
95099fde7382de0487678c9134a7a29f
-
SHA1
f7eb432172c15e1749c3c292b2b9365f648d6b01
-
SHA256
61e709b7ccca1a8c5b5c072725528d056ff960dd6f4c574c07d9804332a726aa
-
SHA512
44acb4dc466ead6739ee2307b17bdf579a808c0204fa060112a0b4b9471a182882367ed8130c7c4abff3d92d2fee502e8d64c1e84707c975a02d8bd1e32f38f6
-
SSDEEP
3072:Wg4tfri9Ei1mSA5J/ILD+EYagIzttHotPXTegN:f45MEJ/IP9jgIzvHoPj5N
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/8518533444f9d26fabdd17053c4e69df268c6f3d3ef8be30fd2ab649641b6343.exe
Files
-
560413121810458b463f81c6dd92268c.bin.zip
Password: infected
-
8518533444f9d26fabdd17053c4e69df268c6f3d3ef8be30fd2ab649641b6343.exe.exe windows:5 windows x86 arch:x86
Password: infected
7e32959e1e010773874596cbc1a01e01
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalUnlock
TlsGetValue
HeapFree
FreeEnvironmentStringsA
GetModuleHandleW
GetConsoleAliasesA
GetLocaleInfoW
GetAtomNameW
CompareStringW
LCMapStringA
GetConsoleOutputCP
GetLastError
GetProcAddress
LoadLibraryA
LocalAlloc
VirtualLock
GetModuleFileNameA
DeleteCriticalSection
LocalFree
GetCommandLineA
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
Sleep
HeapSize
ExitProcess
WriteFile
GetStdHandle
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringW
GetTimeZoneInformation
CompareStringA
SetEnvironmentVariableA
Sections
.text Size: 126KB - Virtual size: 125KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ