Static task
static1
Behavioral task
behavioral1
Sample
fe8a4f533f7073756e9f7abca0b84630c60e402751b96c125b17ad22e6125d6c.exe
Resource
win7-20240220-en
General
-
Target
4346c6d67483a277cb86440d0e7cf0bbaf484b48a99ccd1e37cdbcc7dd7d6be3
-
Size
138KB
-
MD5
1d24665570e16117767a52bc81eada9b
-
SHA1
130258e357dfd4ff72ed12066fbdab67b1b79458
-
SHA256
4346c6d67483a277cb86440d0e7cf0bbaf484b48a99ccd1e37cdbcc7dd7d6be3
-
SHA512
5f18f367e850499eb8b1fec6fc961c3f0571fbdc4730178e3f00fde6e0f362a685f96dd244c4c06b97cbfa199641a002ded47804941e854d9c076189a35fab31
-
SSDEEP
3072:PqgWulcnYJomSHNYm7ZgiCEQfHCejXxiqShGaHcibPGNGIaC91:PnblPoTFZlQzXxKhl8ibPGNGhC91
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/fe8a4f533f7073756e9f7abca0b84630c60e402751b96c125b17ad22e6125d6c.exe
Files
-
4346c6d67483a277cb86440d0e7cf0bbaf484b48a99ccd1e37cdbcc7dd7d6be3.zip
Password: infected
-
fe8a4f533f7073756e9f7abca0b84630c60e402751b96c125b17ad22e6125d6c.exe.exe windows:5 windows x86 arch:x86
32db0a910f88bc9b49b86745793d5182
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsBadHugeReadPtr
GetCommState
HeapFree
GetComputerNameW
LockFile
ConnectNamedPipe
GetModuleHandleW
GetConsoleAliasesLengthA
GetDateFormatA
GetCurrencyFormatW
GetConsoleCP
GlobalAlloc
VirtualFreeEx
LoadLibraryW
GetConsoleAliasExesLengthW
GetLocaleInfoA
GetAtomNameW
SetConsoleTitleA
SetCurrentDirectoryA
GetCurrentDirectoryW
GetProcAddress
FindVolumeMountPointClose
LoadLibraryA
FindFirstVolumeMountPointW
HeapLock
GetModuleFileNameA
FreeEnvironmentStringsW
DeleteCriticalSection
SetCalendarInfoA
SetStdHandle
SetFilePointer
SetDefaultCommConfigA
GetVersionExW
HeapReAlloc
HeapAlloc
ExitProcess
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
EnterCriticalSection
LeaveCriticalSection
GetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
MultiByteToWideChar
WideCharToMultiByte
HeapSize
IsProcessorFeaturePresent
GetConsoleMode
FlushFileBuffers
LCMapStringW
GetStringTypeW
ReadFile
CloseHandle
WriteConsoleW
CreateFileW
user32
LoadIconA
advapi32
OpenThreadToken
RegCreateKeyA
Sections
.text Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 200KB - Virtual size: 200KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 39.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ