Static task
static1
Behavioral task
behavioral1
Sample
a73296a4a734df23352104705d30a68ab898c9c83cce7f621010dfe95d1284ef.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a73296a4a734df23352104705d30a68ab898c9c83cce7f621010dfe95d1284ef.exe
Resource
win10v2004-20240412-en
General
-
Target
af598dd1c6268b55d89c1569dbc256174959f983c4d2a956c2fb47f2f707b110
-
Size
96KB
-
MD5
01af4004e8209548dc6df25b05de9e43
-
SHA1
fa3e89d56ff4ba3edfeacb352de5795648f7bf1a
-
SHA256
af598dd1c6268b55d89c1569dbc256174959f983c4d2a956c2fb47f2f707b110
-
SHA512
7367a730485e389ec79711ee5c148645a9909e91a18e0a4843cabb0451ce8a4df6423169039626a05916f39c7570818f4d8a10ad7b7802273d53ad9fc54d2fa4
-
SSDEEP
3072:FuQe8Z8tMyxBYyz+umuEdHOh9SQ/FIJDW0HBJEEP:F0xBYyz+uYwvlIJ/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/a73296a4a734df23352104705d30a68ab898c9c83cce7f621010dfe95d1284ef.exe
Files
-
af598dd1c6268b55d89c1569dbc256174959f983c4d2a956c2fb47f2f707b110.zip
Password: infected
-
a73296a4a734df23352104705d30a68ab898c9c83cce7f621010dfe95d1284ef.exe.exe windows:6 windows x64 arch:x64
69edffd236c7ac7a48ae0ef0b6ee84ee
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ws2_32
htons
recvfrom
sendto
WSACleanup
closesocket
select
ntohl
WSAStartup
inet_addr
socket
kernel32
SetLastError
WriteConsoleW
HeapReAlloc
HeapSize
SetFilePointerEx
GetFileSizeEx
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
FindFirstFileW
VirtualProtect
FindNextFileW
GetCurrentProcess
DeviceIoControl
FindClose
CreateFileW
GetModuleHandleA
OpenProcess
Sleep
GetTickCount64
K32GetModuleBaseNameW
CreateFileA
CloseHandle
K32EnumProcesses
GetProcAddress
GetCurrentProcessId
GlobalMemoryStatusEx
CreateFileMappingW
MapViewOfFile
IsDebuggerPresent
VirtualQueryEx
CheckRemoteDebuggerPresent
GetProcessHeap
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCPInfo
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
RtlUnwindEx
RtlPcToFileHeader
RaiseException
GetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
TerminateProcess
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
HeapAlloc
HeapFree
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
CompareStringW
LCMapStringW
GetFileType
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
shell32
SHGetKnownFolderPath
ole32
CoTaskMemFree
wininet
InternetOpenUrlA
InternetOpenW
InternetCloseHandle
InternetReadFile
Sections
.text Size: 129KB - Virtual size: 129KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ