Static task
static1
Behavioral task
behavioral1
Sample
bfb6ab0353115a52ed704111bac7464f4b2eff92e1411b07c376baa78a5e993c.exe
Resource
win7-20240221-en
General
-
Target
6e7b6c07595a053ac88e008d1929049766ed70dbb0be9658e892bc33304f7ae1
-
Size
242KB
-
MD5
48aa5b02ef6e5c27a7b447f8b5ba1d5d
-
SHA1
7e7af10d6c37a7b173217f9c25d13606ce3bb3b9
-
SHA256
6e7b6c07595a053ac88e008d1929049766ed70dbb0be9658e892bc33304f7ae1
-
SHA512
52ae98a71144942a458024d17eadd79bfddebbbf835140e89523a17bb019bc5b213ffccbcbc6d1959043e36a3f64308e35664e0e6599f06edc6711a65f053cef
-
SSDEEP
6144:A3ucQqdC8kiZOvcrYSC/FMeNHnZvoEKCr7Lr3Q5MsbS3AI+Od8rnLUbD:AnQqc8Z0r/eeHn9rXAS3AHOd6UbD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/bfb6ab0353115a52ed704111bac7464f4b2eff92e1411b07c376baa78a5e993c.exe
Files
-
6e7b6c07595a053ac88e008d1929049766ed70dbb0be9658e892bc33304f7ae1.zip
Password: infected
-
bfb6ab0353115a52ed704111bac7464f4b2eff92e1411b07c376baa78a5e993c.exe.exe windows:5 windows x86 arch:x86
bea1d1150f59547a36828206b658e6da
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DebugActiveProcess
GetDateFormatW
CreateFileA
GetConsoleAliasesLengthW
GetNumaProcessorNode
GetLocaleInfoA
HeapAlloc
InterlockedIncrement
HeapFree
CreateHardLinkA
ConnectNamedPipe
GetModuleHandleW
FindNextVolumeMountPointA
ReadConsoleOutputA
GetUserDefaultLangID
GlobalAlloc
LoadLibraryW
GetConsoleAliasExesLengthW
lstrcpynW
GetAtomNameW
LocalHandle
SetConsoleTitleA
WritePrivateProfileStringW
GetThreadLocale
GetProcAddress
GetLongPathNameA
SetComputerNameA
SetCalendarInfoW
SetConsoleDisplayMode
GlobalFindAtomW
WaitForMultipleObjects
GetModuleFileNameA
HeapSetInformation
VirtualProtect
GetCurrentDirectoryA
DeleteCriticalSection
FindAtomW
GetSystemTime
SetFileAttributesW
CreateFileW
EncodePointer
DecodePointer
ExitProcess
GetCommandLineW
GetStartupInfoW
RaiseException
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetLastError
IsProcessorFeaturePresent
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
EnterCriticalSection
LeaveCriticalSection
Sleep
HeapSize
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
InterlockedDecrement
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
MultiByteToWideChar
HeapReAlloc
SetStdHandle
WriteConsoleW
LCMapStringW
GetStringTypeW
FlushFileBuffers
ReadFile
CloseHandle
user32
GetMonitorInfoW
CopyRect
LoadIconA
Sections
.text Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 211KB - Virtual size: 211KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 39.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ