Static task
static1
Behavioral task
behavioral1
Sample
89e6e39235a650d3808d4b74722f1588c6eb4d8f31ebc6690884f5d83afa8595.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
89e6e39235a650d3808d4b74722f1588c6eb4d8f31ebc6690884f5d83afa8595.exe
Resource
win10v2004-20231215-en
General
-
Target
81a6875a92cea12ad326dc91ae5a39b5.bin
-
Size
453KB
-
MD5
6d9d59c9bb2a6ad95ec8d35ab05dad83
-
SHA1
fef1993ba8820feac71bddd99a98710be1c82f11
-
SHA256
d1320b2bca8c4ae6df5d1c0ef8be772027d9897961b9c69ae2dea3135614c0c3
-
SHA512
e8f667d78aa42e5cde0944ad07e96837cc47b1efe8ca2146c44f32409e44b817681cde44368601dd7d52a261dabfc7d47405a8f70b4c79635cea1f4a44aad374
-
SSDEEP
12288:2cDXRLYvpidCzqN8ijaXeuC5pbMjr8hsKQ/:JXRLYvpidCGiHpC5lMjrPKA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/89e6e39235a650d3808d4b74722f1588c6eb4d8f31ebc6690884f5d83afa8595.exe
Files
-
81a6875a92cea12ad326dc91ae5a39b5.bin.zip
Password: infected
-
89e6e39235a650d3808d4b74722f1588c6eb4d8f31ebc6690884f5d83afa8595.exe.exe windows:5 windows x86 arch:x86
Password: infected
e368dc091dc26b6066442b735ec875e5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemDefaultLangID
InterlockedDecrement
QueryDosDeviceA
MoveFileWithProgressA
GetModuleHandleW
GetTickCount
VirtualFree
GetConsoleAliasesLengthA
FreeConsole
GetModuleFileNameW
SetComputerNameExW
GetStartupInfoW
CreateJobObjectA
GetLastError
SetLastError
ReadConsoleOutputCharacterA
GetProcAddress
VirtualAlloc
SetVolumeLabelW
LoadLibraryA
WriteConsoleA
InterlockedExchangeAdd
LocalAlloc
MoveFileA
FindFirstVolumeMountPointW
RemoveDirectoryW
FindNextChangeNotification
GlobalFindAtomW
GetStringTypeW
PurgeComm
GetFileAttributesExW
WaitForDebugEvent
WriteConsoleOutputAttribute
SetCalendarInfoA
GetCurrentProcessId
DeleteFileA
MultiByteToWideChar
Sleep
ExitProcess
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
CloseHandle
EnterCriticalSection
LeaveCriticalSection
RaiseException
WriteFile
GetStdHandle
GetModuleFileNameA
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
QueryPerformanceCounter
GetSystemTimeAsFileTime
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetStringTypeA
GetLocaleInfoA
HeapAlloc
HeapReAlloc
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RtlUnwind
GetModuleHandleA
HeapSize
GetConsoleOutputCP
WriteConsoleW
SetFilePointer
CreateFileA
Sections
.text Size: 432KB - Virtual size: 432KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ