Static task
static1
Behavioral task
behavioral1
Sample
0becc5527aba7dc1a746846fc3a2b62f2e46568819b2259d4474eb16e96b9be4.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0becc5527aba7dc1a746846fc3a2b62f2e46568819b2259d4474eb16e96b9be4.exe
Resource
win10v2004-20240412-en
General
-
Target
764f9d0d270efd32b73723512d72556ed118d42fe7a616550c78fa2a9ee0790b
-
Size
159KB
-
MD5
f72822ada51abacf01440aeb9c8762b9
-
SHA1
86fa37c1bfccd10b0d0dd04cee40400381c26829
-
SHA256
764f9d0d270efd32b73723512d72556ed118d42fe7a616550c78fa2a9ee0790b
-
SHA512
8aec744ddcbfe85c43f8efd813d1ccb18b4561f54269f3c24f7c3b740394880d640ae5e543142fd6495d05f7205f70aa2bf58558552b8c2fdef78eb39a016486
-
SSDEEP
3072:BuMpDTxuhn6GiuAazCInfzy8vHtBzK27f/kUi0bVuCli3gqVyqlziq2ERhhI:wGfEhnniu3nfzyytBzD7fNDECw3vYwmL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/0becc5527aba7dc1a746846fc3a2b62f2e46568819b2259d4474eb16e96b9be4.exe
Files
-
764f9d0d270efd32b73723512d72556ed118d42fe7a616550c78fa2a9ee0790b.zip
Password: infected
-
0becc5527aba7dc1a746846fc3a2b62f2e46568819b2259d4474eb16e96b9be4.exe.exe windows:5 windows x86 arch:x86
4f8e2cfb7a56570f82711379d2e1b928
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeEnvironmentStringsA
GetTickCount
LocalFlags
GetConsoleAliasesA
TlsSetValue
LoadLibraryW
GetLocaleInfoW
HeapDestroy
GetAtomNameW
GetModuleFileNameW
IsBadStringPtrA
SetConsoleTitleA
WritePrivateProfileStringW
InterlockedExchange
GetLastError
SetLastError
GetConsoleAliasExesLengthA
VirtualAlloc
LoadLibraryA
OpenWaitableTimerW
LocalAlloc
GetTapeParameters
EraseTape
FreeEnvironmentStringsW
CompareStringA
SetCalendarInfoA
LocalFree
SetFileAttributesW
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeW
GetProcAddress
GetEnvironmentVariableW
EncodePointer
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapFree
IsProcessorFeaturePresent
Sleep
HeapSize
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapReAlloc
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
SetConsoleCtrlHandler
FreeLibrary
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
MultiByteToWideChar
IsValidLocale
user32
GetMonitorInfoA
GetKeyNameTextW
SetActiveWindow
advapi32
OpenEventLogA
Sections
.text Size: 138KB - Virtual size: 137KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ