Static task
static1
Behavioral task
behavioral1
Sample
2f4e51dacadfa0f435684aea798967d63adea5f31e997cde89eed60ba4e9e364.exe
Resource
win7-20240221-en
General
-
Target
06f6f908c2c7f43d14e8a1a6d141d0d1db10b48229047f53b139fcd0335f3ec7
-
Size
213KB
-
MD5
c39021c9af5d476364093d30a15dbc8e
-
SHA1
ea7ce96c0a974378bba7b2b4039f98382a535e89
-
SHA256
06f6f908c2c7f43d14e8a1a6d141d0d1db10b48229047f53b139fcd0335f3ec7
-
SHA512
211d4335c92c7bb026ab7278e94b6d514e4c23eeac43d0291078ef2550ee8c91d3d102eeb6d883a11668d3e9eb84e92471770564ce2d959ac44011e3577bcdaf
-
SSDEEP
6144:inYpI6BmADTq9hyMs7g57wnU6xeJpzDeB8:dI1WEt56TutDE8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/2f4e51dacadfa0f435684aea798967d63adea5f31e997cde89eed60ba4e9e364.exe
Files
-
06f6f908c2c7f43d14e8a1a6d141d0d1db10b48229047f53b139fcd0335f3ec7.zip
Password: infected
-
2f4e51dacadfa0f435684aea798967d63adea5f31e997cde89eed60ba4e9e364.exe.exe windows:5 windows x86 arch:x86
4c596ad645cc863a9d621a9b7d580fb0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetNumaProcessorNode
HeapAlloc
InterlockedIncrement
WaitForSingleObject
SetEvent
ConnectNamedPipe
GetModuleHandleW
GetTickCount
FindNextVolumeMountPointA
GlobalFindAtomA
LoadLibraryW
GetLocaleInfoW
GetFileAttributesA
HeapValidate
CreateFileW
GetConsoleOutputCP
GetLastError
GetCurrentDirectoryW
GetThreadLocale
GetProcAddress
HeapSize
SetComputerNameA
GetAtomNameA
LoadLibraryA
UnhandledExceptionFilter
SetCalendarInfoW
CreateHardLinkW
GetModuleFileNameA
SetConsoleTitleW
HeapSetInformation
FindAtomW
ReadFile
FlushFileBuffers
HeapReAlloc
GetCommandLineA
GetStartupInfoW
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
DecodePointer
EncodePointer
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
EnterCriticalSection
LeaveCriticalSection
HeapFree
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
Sleep
RtlUnwind
MultiByteToWideChar
SetStdHandle
WriteConsoleW
LCMapStringW
GetStringTypeW
IsProcessorFeaturePresent
CloseHandle
user32
GetMonitorInfoA
ole32
CoTaskMemFree
winhttp
WinHttpOpen
Sections
.text Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 180KB - Virtual size: 179KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ