Static task
static1
Behavioral task
behavioral1
Sample
6a345ac4726c427e82a2121ae310adce203aa39c1c3d7ce48f5670cb833345a8.exe
Resource
win7-20240221-en
General
-
Target
f17a91a9010cfb0b469d09346f439f06.bin
-
Size
180KB
-
MD5
77b1eb267a9bd0cee83ac08fb5a37f62
-
SHA1
3237f0431fab14468059f2cffcfa4d9a03831b22
-
SHA256
d9f42c25c78af4369f37b0bfd36f90406d62f61612d1f2e4b4f1070707108519
-
SHA512
60520fb185a8c54b89840a78cbe8f894caeaa48c3c2d6649297e737882dbd012ae80d60e9a292d42d921a680d973442772746e94794d6b55fe87d935468d0291
-
SSDEEP
3072:w3yF3TzHiWL+OYxD/royjKeIkZ5b+LMLP2tPU/OHDhE7GCDxJgeIqON2/p:WylTzHiIKDMfTKCySs0DYFMsp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/6a345ac4726c427e82a2121ae310adce203aa39c1c3d7ce48f5670cb833345a8.exe
Files
-
f17a91a9010cfb0b469d09346f439f06.bin.zip
Password: infected
-
6a345ac4726c427e82a2121ae310adce203aa39c1c3d7ce48f5670cb833345a8.exe.exe windows:5 windows x86 arch:x86
Password: infected
79134121236a21f4a744fb6dd4238594
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDateFormatW
GetFileSize
GetConsoleAliasExesLengthA
WriteConsoleOutputCharacterA
HeapAlloc
ZombifyActCtx
CreateHardLinkA
WideCharToMultiByte
LoadLibraryW
GetFileAttributesW
GetModuleFileNameW
CompareStringW
CreateJobObjectA
InterlockedExchange
SetThreadLocale
GetLastError
GetProcessHeaps
CreateNamedPipeA
GetConsoleDisplayMode
BuildCommDCBW
GetNumaHighestNodeNumber
GetAtomNameA
UnhandledExceptionFilter
LocalAlloc
DnsHostnameToComputerNameA
WritePrivateProfileStringA
AddAtomW
FindAtomA
CreatePipe
VirtualProtect
GetCurrentDirectoryA
ReleaseMutex
FindAtomW
FileTimeToLocalFileTime
HeapReAlloc
GetCommandLineW
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
HeapCreate
HeapFree
GetProcAddress
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
Sleep
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
HeapSize
IsProcessorFeaturePresent
LCMapStringW
MultiByteToWideChar
GetStringTypeW
RaiseException
user32
CopyRect
LoadIconW
Sections
.text Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 180KB - Virtual size: 179KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dabikog Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ