Static task
static1
Behavioral task
behavioral1
Sample
132b4fe0337a790a4f0e00cd6cc02bd865b02519c76054b58a448e72f1afc8de.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
132b4fe0337a790a4f0e00cd6cc02bd865b02519c76054b58a448e72f1afc8de.exe
Resource
win10v2004-20240412-en
General
-
Target
fa06fe6df97d59825cdda05128171c69d55ac3cc9364812f636c37c7dac8bcb8
-
Size
149KB
-
MD5
811c27c3df430872f4191a237c94aec0
-
SHA1
dfabc08791e5d55f137ccd0a1520d5430f2050bd
-
SHA256
fa06fe6df97d59825cdda05128171c69d55ac3cc9364812f636c37c7dac8bcb8
-
SHA512
2f7771d3d43fdd843d3d18bec6a6f836d6368abe914b4a306b16bf891748193075a5fac6ef03bcda6e4c01f9d506cf29d4c6d14085270d0a73551fc18c7801c3
-
SSDEEP
3072:bqXUk0pxHTSMDV2/gQxpuAPhg99RWiYsq1XnKaJ0UqV:mN0Kc2/gQxbyTqjXZuV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/132b4fe0337a790a4f0e00cd6cc02bd865b02519c76054b58a448e72f1afc8de.exe
Files
-
fa06fe6df97d59825cdda05128171c69d55ac3cc9364812f636c37c7dac8bcb8.zip
Password: infected
-
132b4fe0337a790a4f0e00cd6cc02bd865b02519c76054b58a448e72f1afc8de.exe.exe windows:5 windows x86 arch:x86
48be20798c978bee66ef4268b8d28670
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLocaleInfoA
WriteConsoleInputW
lstrlenA
EnumDateFormatsExW
GetLocaleInfoA
GetConsoleAliasExesA
GetDriveTypeW
_llseek
WriteConsoleOutputCharacterA
BuildCommDCBAndTimeoutsA
WriteConsoleOutputW
HeapAlloc
DeleteVolumeMountPointA
InterlockedIncrement
VerSetConditionMask
OpenJobObjectA
GetCommState
GetConsoleAliasA
InterlockedDecrement
GetCurrentProcess
GetSystemWindowsDirectoryW
QueryDosDeviceA
HeapFree
GetEnvironmentStringsW
WriteConsoleInputA
AddConsoleAliasW
OpenSemaphoreA
CreateHardLinkA
SleepEx
GetFileAttributesExA
_lclose
SetTapeParameters
MoveFileWithProgressA
GetModuleHandleW
GetCommConfig
CreateNamedPipeW
LocalFlags
FindNextVolumeMountPointA
GetConsoleAliasesA
GetConsoleAliasesLengthA
ConvertFiberToThread
ExpandEnvironmentStringsA
ReadConsoleW
WaitNamedPipeW
GetUserDefaultLangID
SetCommState
GetCommandLineA
CreateActCtxW
CreateDirectoryExW
GetDriveTypeA
GetVolumePathNameW
GetCurrencyFormatW
ActivateActCtx
GlobalAlloc
SetFileShortNameW
LoadLibraryW
GetConsoleMode
_hread
GetCalendarInfoW
GetSystemWindowsDirectoryA
SetConsoleCP
InterlockedPopEntrySList
GetFileAttributesA
GlobalFlags
HeapCreate
EnumSystemCodePagesA
SetTimeZoneInformation
SetSystemPowerState
WritePrivateProfileSectionW
TerminateProcess
SetThreadContext
GetSystemDirectoryA
lstrlenW
FindNextVolumeMountPointW
ReplaceFileA
GlobalUnlock
DisconnectNamedPipe
GetTempPathW
GetNamedPipeHandleStateW
EnumSystemLocalesA
GetPrivateProfileIntW
GetConsoleOutputCP
VerifyVersionInfoW
GlobalUnfix
FindFirstFileA
GetCurrentDirectoryW
GetProcAddress
RemoveDirectoryA
SetComputerNameA
VerLanguageNameW
GetProcessVersion
GetPrivateProfileStringA
OpenWaitableTimerA
Process32FirstW
IsWow64Process
BuildCommDCBAndTimeoutsW
AddAtomW
CreateEventW
GlobalGetAtomNameW
SetThreadIdealProcessor
FoldStringW
FoldStringA
GlobalFindAtomW
FindNextFileA
_lread
GetModuleHandleA
CancelIo
GetProcessAffinityMask
FindNextFileW
GetStringTypeW
WriteProfileStringW
VirtualProtect
CompareStringA
GetConsoleCursorInfo
QueryPerformanceFrequency
GetShortPathNameW
SetCalendarInfoA
SetProcessShutdownParameters
ReadConsoleInputW
FindAtomW
GetWindowsDirectoryW
DeleteFileW
MoveFileWithProgressW
GetTempPathA
ReadConsoleOutputCharacterW
InterlockedPushEntrySList
TlsFree
EnumSystemLocalesW
GetVolumeInformationW
lstrcpyA
CloseHandle
WriteConsoleW
SetStdHandle
FlushFileBuffers
GetConsoleCP
SetFilePointer
FindFirstFileW
CreateFileA
DebugActiveProcess
GetVolumeNameForVolumeMountPointA
GetCompressedFileSizeA
ExitProcess
HeapReAlloc
IsValidLocale
GetUserDefaultLCID
IsValidCodePage
GetOEMCP
GetACP
HeapSize
GetSystemTimeAsFileTime
GetCurrentProcessId
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
GetCommandLineW
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
IsProcessorFeaturePresent
WriteFile
GetStdHandle
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsAlloc
TlsGetValue
TlsSetValue
SetLastError
GetCurrentThreadId
FreeEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
CreateFileW
user32
CharToOemBuffA
GetDlgCtrlID
CharUpperW
DrawCaption
GetAltTabInfoA
gdi32
GetCharWidthFloatA
advapi32
ClearEventLogA
RevertToSelf
InitiateSystemShutdownA
AbortSystemShutdownW
shell32
DragAcceptFiles
ole32
CoGetInstanceFromFile
winhttp
WinHttpGetProxyForUrl
WinHttpWriteData
WinHttpReadData
WinHttpOpen
Sections
.text Size: 94KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 3.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ