Behavioral task
behavioral1
Sample
RFQ PHASE III PROJECT DESIGN & BUILD FISH NURSERY & HATCHERY FACILITIES AT VARIOUS FISH STATIONS IN.exe
Resource
win7-20240221-en
General
-
Target
28032024_1024_RFQ PHASE III PROJECT DESIGN & BUILD FISH NURSERY & HATCHERY FACILITIES AT VARIOUS FISH STATIONS IN ABU AL ABYAD ISLAND, AL DHAFRAH, U.A.E GAS PIPELINE EXPANSION PROJECTS.rar
-
Size
720KB
-
MD5
aac7196d59f094bd93d0d3c15403c012
-
SHA1
56a8e8fb3d9ee0cf4674a5478e9dceaa82f8f0ab
-
SHA256
2b4c8c83b52e7ecd5bf9f36fb8928c106192492122c3c558c86fd39b178d7c79
-
SHA512
c412dabcc52ff18f7919a962917a642d54718d3289b8b1e55fbde1f1741a023a0892094b9a164cb3ee3fcf41432df54b28231b992b54ffc170c0039cd45b2380
-
SSDEEP
12288:9aRM/516TJrgKTlfu/K0fzGMiFrzMbMGzv+Ix7/sKGTYvwpWS67fD5j7e7:9aCB1AcYfR00zMA2vlx7pAZUS67fD5jO
Malware Config
Signatures
-
resource yara_rule static1/unpack001/RFQ PHASE III PROJECT DESIGN & BUILD FISH NURSERY & HATCHERY FACILITIES AT VARIOUS FISH STATIONS IN ABU AL ABYAD ISLAND, AL DHAFRAH, U.A.E GAS PIPELINE EXPANSION PROJECTS.exe upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule static1/unpack002/out.upx autoit_exe -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/RFQ PHASE III PROJECT DESIGN & BUILD FISH NURSERY & HATCHERY FACILITIES AT VARIOUS FISH STATIONS IN ABU AL ABYAD ISLAND, AL DHAFRAH, U.A.E GAS PIPELINE EXPANSION PROJECTS.exe unpack002/out.upx
Files
-
28032024_1024_RFQ PHASE III PROJECT DESIGN & BUILD FISH NURSERY & HATCHERY FACILITIES AT VARIOUS FISH STATIONS IN ABU AL ABYAD ISLAND, AL DHAFRAH, U.A.E GAS PIPELINE EXPANSION PROJECTS.rar.rar
Password: infected
-
RFQ PHASE III PROJECT DESIGN & BUILD FISH NURSERY & HATCHERY FACILITIES AT VARIOUS FISH STATIONS IN ABU AL ABYAD ISLAND, AL DHAFRAH, U.A.E GAS PIPELINE EXPANSION PROJECTS.exe.exe windows:5 windows x86 arch:x86
Password: infected
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 1.1MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 371KB - Virtual size: 372KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 616KB - Virtual size: 616KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 619KB - Virtual size: 618KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 191KB - Virtual size: 190KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 624KB - Virtual size: 623KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ