Static task
static1
Behavioral task
behavioral1
Sample
2c2939ae4f508ef7b4efce099f860ddc9b56da08be63f8c52c73d44f8a1b3c5f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2c2939ae4f508ef7b4efce099f860ddc9b56da08be63f8c52c73d44f8a1b3c5f.exe
Resource
win10v2004-20240226-en
General
-
Target
966b2f0e41c50986eb0ddc498d04c8a0.bin
-
Size
397KB
-
MD5
67721bc9568d9e5da1706a46dfa625cf
-
SHA1
b6cdab9e2ca7f6a3bab4fc59ae45e0907d0a4a32
-
SHA256
08d09957ac79e659641b9ca7696f543ceb628efd34de966e48e62929869a9064
-
SHA512
071bf527220decaf27442572fb79e01faab6e87064a835e0ed2109addf2a3fb6114b3a34e9cbc19416ecf9d4d2e8cdc84273f5a6e05025e827ae34d6cc00ebb6
-
SSDEEP
12288:vaR7soUiUNFZDOEShJ0/pendyn6u5PiepnFbM4uf3SMjQl:SlsoU1BWhe4nif5PiwFbMtNo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/2c2939ae4f508ef7b4efce099f860ddc9b56da08be63f8c52c73d44f8a1b3c5f.exe
Files
-
966b2f0e41c50986eb0ddc498d04c8a0.bin.zip
Password: infected
-
2c2939ae4f508ef7b4efce099f860ddc9b56da08be63f8c52c73d44f8a1b3c5f.exe.exe windows:4 windows x86 arch:x86
Password: infected
0e710d1dedbbf7bc573b5df52d5ee277
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileTime
SystemTimeToFileTime
SetFileTime
SetFileAttributesA
CreateFileA
LocalFree
lstrcmpA
GetFileAttributesA
GetVolumeInformationA
_lopen
GetModuleFileNameA
GetVersionExA
FileTimeToSystemTime
_llseek
lstrcpynA
GetSystemDirectoryA
SearchPathA
GetEnvironmentVariableA
GetWindowsDirectoryA
lstrcatA
GetCurrentDirectoryA
_lclose
CloseHandle
lstrcpyA
lstrlenA
CreateDirectoryA
IsDBCSLeadByte
_lread
WriteFile
LocalAlloc
DeleteFileA
GetStartupInfoA
GetModuleHandleA
user32
SetFocus
GetDlgItemTextA
PostMessageA
KillTimer
SendDlgItemMessageA
SetWindowTextA
DialogBoxParamA
LoadIconA
SetTimer
IsIconic
DestroyIcon
MoveWindow
GetSystemMetrics
GetWindowRect
BeginPaint
SendMessageA
EndPaint
SetDlgItemTextA
PeekMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
MessageBoxA
wsprintfA
CharPrevA
EndDialog
EnableWindow
GetDlgItem
DrawIcon
gdi32
SetMapMode
GetMapMode
comdlg32
GetOpenFileNameA
GetFileTitleA
shell32
ShellExecuteA
crtdll
_global_unwind2
_local_unwind2
memset
_strnicmp
exit
strchr
strrchr
atoi
_fmode_dll
_exit
_XcptFilter
_acmdln_dll
_initterm
__GetMainArgs
_commode_dll
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 165B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 736B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ