Static task
static1
Behavioral task
behavioral1
Sample
1b6e098367a606d0b6eed5d45fb11e1d7595ba24bd248466458580d8bdfb5d83.exe
Resource
win7-20240220-en
General
-
Target
958a08870802dadde681585f52b4a28cc25e597f511f865311e51be7d37ea566
-
Size
379KB
-
MD5
63d5c9fd8e2d3a59021e93910330e3fe
-
SHA1
99c19bb206955820e2b28774c3a72a547c61aae2
-
SHA256
958a08870802dadde681585f52b4a28cc25e597f511f865311e51be7d37ea566
-
SHA512
98cbbc6296be89966309c7ff4ced84df0a59d42999c6d065a46c06f63964d2617411413c2be800708755b56f9c982025dfa3ac27cc4c1b344fa38b801aae0a19
-
SSDEEP
6144:ml638bQtQhBrUOtTCBHZ/SoPeGmgoLi7EZtX9a7OL3XhSnhkDT+mFFolQ1HOPBxM:ml638bZrUd3/ScLobzXg7ElimFFolVPs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/1b6e098367a606d0b6eed5d45fb11e1d7595ba24bd248466458580d8bdfb5d83.exe
Files
-
958a08870802dadde681585f52b4a28cc25e597f511f865311e51be7d37ea566.zip
Password: infected
-
1b6e098367a606d0b6eed5d45fb11e1d7595ba24bd248466458580d8bdfb5d83.exe.exe windows:6 windows x86 arch:x86
c7a19df34b14b62b6c4638a75f089976
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AcquireSRWLockExclusive
AcquireSRWLockShared
AllocConsole
DeleteCriticalSection
EnterCriticalSection
ExitThread
FindResourceA
FlsAlloc
FlsGetValue
FlsSetValue
GetConsoleWindow
GetCurrentProcess
GetLastError
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetStartupInfoA
GetSystemTimeAsFileTime
InitOnceExecuteOnce
InitializeCriticalSection
IsDBCSLeadByteEx
K32EnumProcessModules
LeaveCriticalSection
LoadResource
LocalAlloc
MultiByteToWideChar
ReleaseSRWLockExclusive
ReleaseSRWLockShared
SetUnhandledExceptionFilter
SizeofResource
Sleep
TlsGetValue
VirtualProtect
VirtualQuery
WideCharToMultiByte
user32
EnumThreadWindows
FindWindowA
ShowWindow
shell32
CommandLineToArgvW
msvcrt
__getmainargs
__initenv
__mb_cur_max
__p__acmdln
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_aligned_free
_aligned_malloc
_amsg_exit
_assert
_cexit
_errno
_initterm
_iob
_ismbblead
_lock
_onexit
_stricmp
_unlock
abort
atoi
calloc
exit
fflush
fprintf
fputc
fputwc
free
fwprintf
fwrite
getenv
iswctype
isxdigit
localeconv
malloc
memchr
memcmp
memcpy
memmove
memset
rand
realloc
setlocale
signal
srand
strchr
strcmp
strerror
strlen
strncmp
time
vfprintf
wcslen
Sections
.text Size: 177KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.eh_fram Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gcc_exc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 308KB - Virtual size: 308KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ