Static task
static1
Behavioral task
behavioral1
Sample
319d89eb4bc1fde194704b86466c0be5ffebb433d40cb187530c7f458ff5b477.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
319d89eb4bc1fde194704b86466c0be5ffebb433d40cb187530c7f458ff5b477.exe
Resource
win10v2004-20240412-en
General
-
Target
c8a014e516f702b6717824b370537e24165156d10373587b8d0242ad7911e833
-
Size
143KB
-
MD5
bbece4b8ff76923f8683c4643c97b40e
-
SHA1
b0fdeb5edc551b4d51513281d0d3d22a7fa4ca69
-
SHA256
c8a014e516f702b6717824b370537e24165156d10373587b8d0242ad7911e833
-
SHA512
da31f44881a473c78e39f888c2ed173ad1a1cd42ee66ae5d950f52e714545dcf102e32ac672131ee7e402299e1da05eb6b21fab5c9379edc2ab165c368ad6cc5
-
SSDEEP
3072:KRBVWD9ZoENaaNEiSARcqPwPHWzQdhTsf9wHYS6HSKr4GjaMCXPZrJ:0WD9naGEi7yqMUamfdxHS0pxuRd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/319d89eb4bc1fde194704b86466c0be5ffebb433d40cb187530c7f458ff5b477.exe
Files
-
c8a014e516f702b6717824b370537e24165156d10373587b8d0242ad7911e833.zip
Password: infected
-
319d89eb4bc1fde194704b86466c0be5ffebb433d40cb187530c7f458ff5b477.exe.exe windows:6 windows x86 arch:x86
4f0cdfd3e1be2bc790b5aa9061b7d52c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeConsole
CloseHandle
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
QueryPerformanceCounter
EncodePointer
DecodePointer
MultiByteToWideChar
WideCharToMultiByte
LCMapStringEx
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
GetStringTypeW
GetCPInfo
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetCurrentProcessId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
CreateFileW
RaiseException
RtlUnwind
GetLastError
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetModuleHandleExW
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetCommandLineA
GetCommandLineW
HeapFree
HeapAlloc
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
ReadFile
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
HeapReAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
GetProcessHeap
HeapSize
WriteConsoleW
Sections
.text Size: 134KB - Virtual size: 134KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 34KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ