Static task
static1
Behavioral task
behavioral1
Sample
e80be2782ae7e0bdab958f9ed74f3e1056a0c16b6074a6390a245a6a49e58f0e.exe
Resource
win7-20240221-en
General
-
Target
e80be2782ae7e0bdab958f9ed74f3e1056a0c16b6074a6390a245a6a49e58f0e.zip
-
Size
312KB
-
MD5
9958a9f13741a2d3214ed080b2a6fa92
-
SHA1
6eb31e6dfb556cd8cd272bfa0cd7cc743a999e66
-
SHA256
234320595b175876996bfcbe140345a66fd6e3dc20d2748874ca3cec17e9d405
-
SHA512
49aad830aba1a5c77acd0e555e45770ed02d316c1cc8d7e4a2ed50fa449bd1f6b4d22fc861ebe6a274e9763d19878bf35eece1f78d91492300847df2c686ccb1
-
SSDEEP
6144:i2SUZMJUiaR2Nwb4Z/r5sBnl69vBPEFpY9tD2JqIPK8:bSoMJUn4wb4l5sBnI9vBPEFpYj6l9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/e80be2782ae7e0bdab958f9ed74f3e1056a0c16b6074a6390a245a6a49e58f0e.exe
Files
-
e80be2782ae7e0bdab958f9ed74f3e1056a0c16b6074a6390a245a6a49e58f0e.zip.zip
Password: infected
-
e80be2782ae7e0bdab958f9ed74f3e1056a0c16b6074a6390a245a6a49e58f0e.exe.exe windows:5 windows x86 arch:x86
Password: infected
49bdaf6614ab56f1bf5b378774341bdf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteConsoleOutputCharacterW
GetLocaleInfoA
HeapAlloc
InterlockedDecrement
CreateJobObjectW
HeapFree
GetProfileSectionA
GetNumaAvailableMemoryNode
GlobalAlloc
LoadLibraryW
GetFileAttributesA
GetTimeFormatW
LocalReAlloc
GetModuleFileNameW
GetTimeZoneInformation
CreateFileW
RaiseException
SetThreadLocale
GetLastError
GetCurrentDirectoryW
FindVolumeMountPointClose
HeapSize
LocalLock
SetComputerNameA
GetAtomNameA
LoadLibraryA
SetConsoleCtrlHandler
CreatePipe
BuildCommDCBA
VirtualProtect
ScrollConsoleScreenBufferA
SetCalendarInfoA
FindAtomW
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
Sleep
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapReAlloc
LCMapStringW
MultiByteToWideChar
GetStringTypeW
user32
GetMonitorInfoW
Sections
.text Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 275KB - Virtual size: 274KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bih Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ