Static task
static1
Behavioral task
behavioral1
Sample
f5080001169312dcc8dfa20d2dc172f5bd8cbd336036836927c90b4f30ae9e50.exe
Resource
win7-20240221-en
General
-
Target
c58a7b1b33e4ceed314a61cbc877d961.bin
-
Size
768KB
-
MD5
4252dafd30fe9db08b1bdc53f67fff14
-
SHA1
4d5878c77e1cc60c6ed1f88a3e214b3c9172168a
-
SHA256
19993e1567578afe66c0964aecd5e5e64a8213c3056d54494eefc2177a0af8eb
-
SHA512
a829a1d0ee03b46af961f861eb617282c55f0c74c1b20a67b59a41485b409345a5f95399be1f63bd9abaa20ed8ef99ef1db919d8f33149de415feed70dae05c9
-
SSDEEP
12288:C5zcxjkOvAS5wGwMGJ1BrPWRc4TBKI61LpGoCp/TBwH4m1pnN6JU1eSSUkiYhI:2wxjkOvAMwdxcdAxpGY4m1pnIzRI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/f5080001169312dcc8dfa20d2dc172f5bd8cbd336036836927c90b4f30ae9e50.exe
Files
-
c58a7b1b33e4ceed314a61cbc877d961.bin.zip
Password: infected
-
f5080001169312dcc8dfa20d2dc172f5bd8cbd336036836927c90b4f30ae9e50.exe.exe windows:5 windows x86 arch:x86
Password: infected
d0eb7b8c702cd1b9d76bcc539912ddcb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetDefaultCommConfigA
EnumCalendarInfoA
GetConsoleAliasesLengthW
VirtualQuery
GetCommState
HeapFree
GetComputerNameW
UnlockFile
WaitForSingleObjectEx
GetModuleHandleW
GetDateFormatA
EnumTimeFormatsW
GlobalAlloc
LoadLibraryW
IsValidLocale
GetLocaleInfoW
IsBadWritePtr
GetAtomNameW
FindNextVolumeMountPointW
SetCurrentDirectoryA
GetCurrentDirectoryW
GetLongPathNameW
GetProcAddress
GetProcessHeaps
BuildCommDCBW
LoadLibraryA
SetCalendarInfoW
GetModuleFileNameA
SetConsoleTitleW
FreeEnvironmentStringsW
BuildCommDCBA
VirtualProtect
FileTimeToLocalFileTime
HeapAlloc
Sleep
ExitProcess
GetStartupInfoW
RaiseException
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetLastError
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
WriteFile
GetStdHandle
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
CreateFileA
CloseHandle
FlushFileBuffers
GetModuleHandleA
user32
LoadIconW
Sections
.text Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 805KB - Virtual size: 804KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ