Static task
static1
Behavioral task
behavioral1
Sample
3c50f6369f0938f42d47db29a1f398e754acb2a8d96fd4b366246ac2ccbe250a.exe
Resource
win7-20240221-en
General
-
Target
decrypter_exe_15329643400.zip
-
Size
373KB
-
MD5
b2b4a83031572cab10419989f805bb22
-
SHA1
008b13a03f5be2b61bc0de23df4890374495ef26
-
SHA256
4bd45022d928307b4f4dfbf4ec16a640ccc3a1cd26b4f2ac76516f9c1596d6c0
-
SHA512
ba22fab490853aa7f1db8abd33a26aae619d985eecc1ca53bfefdc46362fb9b89e7430ae77fc96328b304cb7b5e09592e9c9b3ed68ddcb230c17409943d173bb
-
SSDEEP
6144:5H+vBvP1fDu7AxihoZDaZt3g3f5IpvgiQo3JZXccB0wgu6sTqK45qj/Q00VQ9CX:5H+JvdSJhV3gvap4iQo3JZscSwgmWwQP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/3c50f6369f0938f42d47db29a1f398e754acb2a8d96fd4b366246ac2ccbe250a
Files
-
decrypter_exe_15329643400.zip.zip
Password: infected
-
3c50f6369f0938f42d47db29a1f398e754acb2a8d96fd4b366246ac2ccbe250a.exe windows:6 windows x86 arch:x86
96ec2ac894d68527a3776978d0dd5852
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
CloseHandle
GetLastError
CreateMutexW
OpenMutexW
GetTickCount
GetModuleFileNameW
lstrcmpW
FindFirstVolumeW
FindNextVolumeW
FindVolumeClose
GetVolumeInformationW
GetVolumePathNamesForVolumeNameW
FindNextFileW
ReadFile
SetEndOfFile
SetFileAttributesW
SetFilePointerEx
WaitForSingleObject
CreateThread
VirtualAlloc
VirtualFree
SetLastError
QueryPerformanceCounter
QueryPerformanceFrequency
SetStdHandle
FindFirstFileW
FindClose
GetFileSizeEx
CreateFileW
Sleep
GetCurrentThreadId
GetNativeSystemInfo
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryAcquireSRWLockExclusive
WideCharToMultiByte
MultiByteToWideChar
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
WakeAllConditionVariable
SleepConditionVariableSRW
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
GetLocaleInfoEx
EncodePointer
DecodePointer
LCMapStringEx
GetStringTypeW
CompareStringEx
GetCPInfo
InitializeSListHead
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetCurrentProcess
TerminateProcess
GetCurrentProcessId
RaiseException
RtlUnwind
InterlockedPushEntrySList
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
GetStdHandle
HeapAlloc
HeapFree
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
ReadConsoleW
HeapReAlloc
HeapSize
GetTimeZoneInformation
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
WriteConsoleW
advapi32
CryptReleaseContext
CryptAcquireContextA
CryptGenRandom
Sections
.text Size: 599KB - Virtual size: 598KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 127KB - Virtual size: 126KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 37KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ