Static task
static1
Behavioral task
behavioral1
Sample
7c401a0b62551d535e16b6437b6520f8c033f83fe74a81675eff857cd50f5163.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7c401a0b62551d535e16b6437b6520f8c033f83fe74a81675eff857cd50f5163.exe
Resource
win10v2004-20231215-en
General
-
Target
72526b222184b2c4c61759734078b9d1.bin
-
Size
81KB
-
MD5
99e215c4aba10032068fd089cf662a58
-
SHA1
3a2bad0064374a23595695d440cbc700f41505c6
-
SHA256
e4e56022243554bec0d7ab27f980d24355cef56b3c7f57f75137d58acfefaa27
-
SHA512
2e3f4d762da8a62211b9064238efd45432012438e4b2628c76e7d3e176cf8ef800ff0465f770f36b59c8017ef04a2e893d7bd2f9140c4a1f32f6b41a7dd17519
-
SSDEEP
1536:eiTq+MqWwUAs2yFicWlYy8OjIxrzJAKo+H9oFrjoZvyi5z+2oANlfC:eijt1cWlYy8OjIxrS4SrjUb0L8C
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/7c401a0b62551d535e16b6437b6520f8c033f83fe74a81675eff857cd50f5163.exe
Files
-
72526b222184b2c4c61759734078b9d1.bin.zip
Password: infected
-
7c401a0b62551d535e16b6437b6520f8c033f83fe74a81675eff857cd50f5163.exe.exe windows:4 windows x86 arch:x86
Password: infected
321e8cb3e6acb5f44272d988bb955d41
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
GetStdHandle
GetLocalTime
Sleep
WaitForSingleObject
WaitForMultipleObjects
DebugBreak
QueryPerformanceCounter
QueryPerformanceFrequency
GetCurrentDirectoryA
GetFullPathNameA
FindFirstFileA
GetDriveTypeA
FindClose
FileTimeToLocalFileTime
FileTimeToSystemTime
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetTickCount
LeaveCriticalSection
SetEndOfFile
LoadLibraryA
GetProcAddress
IsBadCodePtr
IsBadReadPtr
LCMapStringW
LCMapStringA
SetStdHandle
FlushFileBuffers
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
InterlockedIncrement
InterlockedDecrement
SetFilePointer
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
SetUnhandledExceptionFilter
EnterCriticalSection
UnhandledExceptionFilter
GetOEMCP
DeleteCriticalSection
InitializeCriticalSection
SetEvent
CreateEventA
CreateThread
SetCurrentDirectoryA
WriteFile
GetModuleFileNameA
CreateFileA
ReadFile
CloseHandle
OutputDebugStringA
GetACP
GetCPInfo
TlsGetValue
SetLastError
TlsAlloc
GetCurrentProcess
TerminateProcess
GetFileType
SetHandleCount
HeapSize
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
ExitProcess
GetVersion
GetCommandLineA
HeapAlloc
HeapFree
HeapReAlloc
GetCurrentThreadId
TlsSetValue
ExitThread
RaiseException
RtlUnwind
GetTimeZoneInformation
GetSystemTime
GetModuleHandleA
GetStartupInfoA
user32
SetFocus
MoveWindow
GetClientRect
SendMessageA
CreateWindowExA
GetSubMenu
LoadMenuA
RegisterClassExA
LoadImageA
GetMessageA
LoadCursorA
LoadIconA
DialogBoxParamA
DestroyWindow
PostMessageA
TrackPopupMenu
SetForegroundWindow
GetCursorPos
DefWindowProcA
GetSystemMetrics
GetDlgItem
MessageBoxA
DispatchMessageA
GetMenuItemID
CheckMenuItem
ShowWindow
GetDlgItemTextA
EndDialog
SendDlgItemMessageA
KillTimer
EnableWindow
SetDlgItemTextA
SetTimer
UpdateWindow
SetWindowTextA
DestroyMenu
PostQuitMessage
TranslateMessage
gdi32
GetStockObject
comdlg32
GetSaveFileNameA
advapi32
CryptReleaseContext
CryptAcquireContextA
RegisterServiceCtrlHandlerA
SetServiceStatus
OpenServiceA
QueryServiceStatus
DeleteService
OpenSCManagerA
CreateServiceA
CloseServiceHandle
StartServiceCtrlDispatcherA
CryptGenRandom
shell32
Shell_NotifyIconA
wsock32
WSAStartup
inet_addr
gethostbyname
ioctlsocket
connect
socket
htons
shutdown
closesocket
WSAGetLastError
recv
__WSAFDIsSet
select
WSACleanup
accept
listen
bind
htonl
inet_ntoa
send
Sections
.text Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ