Static task
static1
Behavioral task
behavioral1
Sample
d2ff8bef72f7424016a3e20986a20ba4b790de32a6dd300b9e96b59f969ff735.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
d2ff8bef72f7424016a3e20986a20ba4b790de32a6dd300b9e96b59f969ff735.exe
Resource
win10v2004-20231215-en
General
-
Target
d8e7dc43e57929c6d11ffd163a6b2aa1.bin
-
Size
188KB
-
MD5
cce86dfbc2fef199e48fcc7360506920
-
SHA1
738491426f749fdb5c03f451b56dde6c92078508
-
SHA256
58e244cd64506b0f5801213470bb49a25d519e4aac56f86b4eb96ad36f88cd2c
-
SHA512
80051ab93bc826bad3661d59708d02aef4fe6f8a2594ba5763aa6e81ee50fa3053c3743e3e7483c6641774b0d14ee5d35b1da97b14d48cd0dc72d8fe937ae952
-
SSDEEP
3072:3SMHclQqRj2+orWIp9Ud7tQI6OmwPPndpH21KsEnZKi6XDnsoM7egN0irOjrS5YE:/wBd2+or9M7tQJwPPdpW1KsEn16zn4ND
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/d2ff8bef72f7424016a3e20986a20ba4b790de32a6dd300b9e96b59f969ff735.exe
Files
-
d8e7dc43e57929c6d11ffd163a6b2aa1.bin.zip
Password: infected
-
d2ff8bef72f7424016a3e20986a20ba4b790de32a6dd300b9e96b59f969ff735.exe.exe windows:5 windows x86 arch:x86
Password: infected
31e36cf00bd38f6118c77fe30a6b7e3e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocaleInfoA
WriteConsoleOutputCharacterA
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
CreateHardLinkA
GetModuleHandleW
GetTickCount
GetConsoleAliasesLengthA
GlobalFindAtomA
GetWriteWatch
WriteConsoleW
GetConsoleFontSize
SetComputerNameExW
GetStartupInfoA
SetThreadContext
SetLastError
GetProcAddress
VirtualAlloc
SetComputerNameA
LoadLibraryA
LocalAlloc
DeleteTimerQueue
AddAtomW
QueryDosDeviceW
lstrcmpiW
FindFirstChangeNotificationA
PurgeComm
DeleteFileW
GetCurrentProcessId
SuspendThread
FindResourceA
GetLastError
GetComputerNameA
Sleep
ExitProcess
GetStartupInfoW
HeapAlloc
HeapFree
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
WriteFile
GetModuleFileNameA
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
WideCharToMultiByte
RtlUnwind
GetModuleHandleA
HeapSize
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
CloseHandle
WriteConsoleA
GetConsoleOutputCP
SetStdHandle
CreateFileA
gdi32
GetCharABCWidthsFloatA
DeleteMetaFile
Sections
.text Size: 144KB - Virtual size: 144KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 183KB - Virtual size: 183KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ