Static task
static1
Behavioral task
behavioral1
Sample
a04d2668b1853051dd5db78721b7deae7490dbd60cef96d55cc91ff8c5d4730d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a04d2668b1853051dd5db78721b7deae7490dbd60cef96d55cc91ff8c5d4730d.exe
Resource
win10v2004-20240226-en
General
-
Target
a04d2668b1853051dd5db78721b7deae7490dbd60cef96d55cc91ff8c5d4730d.zip
-
Size
646KB
-
MD5
1235286949b3fd5e8b9399b9ccc91f74
-
SHA1
e3f2a8193848abeb4291c8756256d05e5192543b
-
SHA256
9466916562675062bb09f48b6d4320c2ab782cb00cf3f015ef045097fa0676fa
-
SHA512
5f977b7cb4274be0bfc76d068698ca45091e710a694d6c2ad971814862d365bb86b7bf4558810a57f487438fb19a43a9f85a0440f03d0b6bb6b4935d06045cc0
-
SSDEEP
12288:pLbfUs5LM8UoR/NiuQnuNdlfXh549VI+MIIOiCDIxJl9q2yj7ZSqNVnD:FfU+M8vziuD/9RmVFYvT/yj7swD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/a04d2668b1853051dd5db78721b7deae7490dbd60cef96d55cc91ff8c5d4730d
Files
-
a04d2668b1853051dd5db78721b7deae7490dbd60cef96d55cc91ff8c5d4730d.zip.zip
Password: threatbook
-
a04d2668b1853051dd5db78721b7deae7490dbd60cef96d55cc91ff8c5d4730d.exe windows:5 windows x86 arch:x86
Password: threatbook
bb28682442956c99360ed60f6394bb75
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempFileNameW
VirtualFree
WriteFile
CreateFileW
lstrlenW
GetTempPathW
SetLastError
VirtualAlloc
lstrcpyW
GetTickCount
Sleep
lstrcatA
GetLastError
GetProcAddress
LoadLibraryA
WideCharToMultiByte
MultiByteToWideChar
SetFilePointer
FindResourceW
LoadResource
SizeofResource
LockResource
CreateFileA
GetNativeSystemInfo
GetCurrentProcess
LoadLibraryW
CreateProcessA
GetTempFileNameA
GetModuleFileNameA
GetTempPathA
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
EncodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCommandLineW
HeapSetInformation
GetStartupInfoW
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
RaiseException
GetCPInfo
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetModuleHandleW
ExitProcess
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
HeapSize
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
GetStringTypeW
GetLocaleInfoW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
HeapReAlloc
WriteConsoleW
SetStdHandle
CompareStringW
SetEnvironmentVariableA
ExpandEnvironmentStringsW
CloseHandle
DecodePointer
CreateProcessW
ws2_32
ntohl
Sections
.text Size: 87KB - Virtual size: 86KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 581KB - Virtual size: 581KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ