Static task
static1
Behavioral task
behavioral1
Sample
f379c2c732470dbce8e17423baf7f6fcca63bcb13c4ade33a15df1225e3841be.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f379c2c732470dbce8e17423baf7f6fcca63bcb13c4ade33a15df1225e3841be.exe
Resource
win10v2004-20240412-en
General
-
Target
3313ecbafa522a59381fc255e0f8f6a05ef6979af079ba11949f62cc2c59a7aa
-
Size
145KB
-
MD5
65413c362e076ebab3f28118c260aafa
-
SHA1
3af5892f8ca79b67e13f6f92660049d64232e915
-
SHA256
3313ecbafa522a59381fc255e0f8f6a05ef6979af079ba11949f62cc2c59a7aa
-
SHA512
679f9f5951241f8d7bb90799376e0a0ffc0505a1f93a5cf91e775a6567e3c892a6d082adee4fd46847bd11c245151901a2dccf905a2026ca3d0bccc776033166
-
SSDEEP
3072:7Y2mAZL71xzT8G+J1hXnxdhZ0E6kDNb8pJZYUx:7Y2mo1x7+L9xdv0mxQ1YI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/f379c2c732470dbce8e17423baf7f6fcca63bcb13c4ade33a15df1225e3841be.exe
Files
-
3313ecbafa522a59381fc255e0f8f6a05ef6979af079ba11949f62cc2c59a7aa.zip
Password: infected
-
f379c2c732470dbce8e17423baf7f6fcca63bcb13c4ade33a15df1225e3841be.exe.exe windows:5 windows x86 arch:x86
908ba8e4af41106f28e75567d2d57d50
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteConsoleOutputCharacterA
HeapFree
GetTimeFormatA
FreeEnvironmentStringsA
GetTickCount
LocalFlags
TlsSetValue
LoadLibraryW
GetLocaleInfoW
GetAtomNameW
GetModuleFileNameW
IsBadStringPtrA
SetConsoleTitleA
WritePrivateProfileStringW
GetConsoleAliasesW
InterlockedExchange
GetLastError
GetConsoleAliasExesLengthA
GetProcAddress
VirtualAlloc
OpenWaitableTimerA
LoadLibraryA
LocalAlloc
SetCalendarInfoW
SetConsoleOutputCP
GetTapeParameters
EraseTape
FreeEnvironmentStringsW
CompareStringA
LocalFree
SetFileAttributesW
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeW
SetLastError
GetEnvironmentVariableW
EncodePointer
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
IsProcessorFeaturePresent
HeapCreate
HeapDestroy
Sleep
HeapSize
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapReAlloc
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
SetConsoleCtrlHandler
FreeLibrary
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
MultiByteToWideChar
IsValidLocale
user32
GetForegroundWindow
GetKeyNameTextW
GetMonitorInfoA
advapi32
OpenEventLogW
Sections
.text Size: 139KB - Virtual size: 138KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ