Static task
static1
Behavioral task
behavioral1
Sample
6915f167820a8885d0136a2cc7335350fd44045ec25ad5717bb21bbb5374309f.exe
Resource
win7-20240220-en
General
-
Target
23b1062e0275e2f98de00d3ee190ceb4c6b2ba594f40b523730bbf657f156240
-
Size
322KB
-
MD5
9620e4a49feda3e45df8e1ce74d05e80
-
SHA1
b56e55cb7d805e9481e2f7034e2b3d78543236ef
-
SHA256
23b1062e0275e2f98de00d3ee190ceb4c6b2ba594f40b523730bbf657f156240
-
SHA512
a33a4c50ccf27d8a0ac0c9f00ff0c3035fcfd07c8d3e31911b449f95ced7a2c97fe833c937e80459fe72788fd720ac0ebd893380c71359f67624e42a2e8598d7
-
SSDEEP
6144:LK8P/x/hNeHF38O4lIcJTbDOajx90muuN2JU++PP9z3E9bBxo8OJkwCXKKd:L1nQBD4/5ZNvGUXVw9bXoJJ9UKKd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/6915f167820a8885d0136a2cc7335350fd44045ec25ad5717bb21bbb5374309f.exe
Files
-
23b1062e0275e2f98de00d3ee190ceb4c6b2ba594f40b523730bbf657f156240.zip
Password: infected
-
6915f167820a8885d0136a2cc7335350fd44045ec25ad5717bb21bbb5374309f.exe.exe windows:5 windows x86 arch:x86
14b99580ca219c92eefe00475417aec5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TryEnterCriticalSection
GetConsoleAliasExesLengthA
SetDefaultCommConfigW
HeapFree
GetComputerNameW
UnlockFile
GetModuleHandleW
VirtualFree
FindNextVolumeMountPointA
GetConsoleAliasesLengthA
GetDateFormatA
SetCommState
GetConsoleCP
GlobalAlloc
LoadLibraryW
GetLocaleInfoW
EnumCalendarInfoA
GetAtomNameW
SetConsoleTitleA
SetCurrentDirectoryA
GetCurrentDirectoryW
GetLongPathNameW
GetProcAddress
FindVolumeMountPointClose
GetProcessHeaps
LoadLibraryA
SetCalendarInfoW
WaitForMultipleObjects
CreatePipe
GetModuleFileNameA
FreeEnvironmentStringsW
CloseHandle
CreateFileW
IsBadWritePtr
HeapReAlloc
HeapAlloc
GetLastError
GetCommandLineW
HeapSetInformation
GetStartupInfoW
RaiseException
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DecodePointer
EncodePointer
IsProcessorFeaturePresent
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
WideCharToMultiByte
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
Sleep
RtlUnwind
HeapSize
SetStdHandle
WriteConsoleW
MultiByteToWideChar
LCMapStringW
GetStringTypeW
FlushFileBuffers
user32
LoadIconW
advapi32
ReadEventLogW
ole32
CoTaskMemFree
Sections
.text Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 346KB - Virtual size: 345KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 111KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ