Static task
static1
Behavioral task
behavioral1
Sample
80a3ebff5af50b239170fbddc5f7286cbf437570d285790257749cbfeaa52709.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
80a3ebff5af50b239170fbddc5f7286cbf437570d285790257749cbfeaa52709.exe
Resource
win10v2004-20231215-en
General
-
Target
b47bcc229d0aaaf951f2103c8aafa513.bin
-
Size
313KB
-
MD5
4c1287ed5605d2325bcec5f4142838ee
-
SHA1
fc608da10dac409e71819c65be8c81beffa1da13
-
SHA256
03f117483b27d6f5428cefec2f1c3f3acce6364287aae5fb6f3239914f20a043
-
SHA512
adf652d8e61779e26f6ee53c8e70f6434774a68d41fac34526c7bb431e4e24a46d950b591e72ff01dc21b75198c792f32a240c3b822c12dd90abc3e7636abe0d
-
SSDEEP
6144:uEyjRxn5Dlh7Q73izECiKGE8K2rPIblHCMEZUxjjjGF/vcYRIW+RxLYwYK8z:YjRxtQ7lrKGXrUK2xH6VRVHbK4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/80a3ebff5af50b239170fbddc5f7286cbf437570d285790257749cbfeaa52709.exe
Files
-
b47bcc229d0aaaf951f2103c8aafa513.bin.zip
Password: infected
-
80a3ebff5af50b239170fbddc5f7286cbf437570d285790257749cbfeaa52709.exe.exe windows:4 windows x86 arch:x86
Password: infected
81a048a92f4dd1237e68c5435c7cdc7b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
dsound
ord1
kernel32
GetLocaleInfoW
GetOEMCP
GetACP
LoadLibraryA
CreateFileA
SetStdHandle
GetTimeZoneInformation
VirtualQuery
GetSystemInfo
SetEndOfFile
IsBadCodePtr
IsBadReadPtr
HeapSize
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
GetFileAttributesA
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
VirtualProtect
WideCharToMultiByte
GetLocaleInfoA
MultiByteToWideChar
RtlUnwind
GetSystemTimeAsFileTime
GetLastError
CreateDirectoryA
HeapReAlloc
HeapAlloc
RaiseException
ExitProcess
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileA
FindNextFileA
DeleteFileA
GetLocalTime
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
GetStartupInfoA
GetCommandLineA
GetVersionExA
GetCPInfo
HeapFree
LCMapStringA
LCMapStringW
GetTimeFormatA
GetDateFormatA
CompareStringA
CompareStringW
GetStringTypeA
GetStringTypeW
CloseHandle
ReadFile
WriteFile
SetFilePointer
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetModuleFileNameA
FlushFileBuffers
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
RemoveDirectoryA
user32
AdjustWindowRectEx
CreateWindowExA
ShowWindow
UpdateWindow
GetDC
LoadIconA
LoadCursorA
RegisterClassExA
DefWindowProcA
BeginPaint
EndPaint
PostQuitMessage
SendMessageA
SetWindowTextA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
InvalidateRect
MessageBoxA
GetWindowRect
GetClientRect
gdi32
CreateCompatibleBitmap
DeleteObject
GetObjectA
SetBitmapBits
CreateCompatibleDC
SelectObject
BitBlt
Sections
.text Size: 472KB - Virtual size: 469KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 124KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 84KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ