Static task
static1
Behavioral task
behavioral1
Sample
9e60de921d09472b17a0e0e92a159c63b5cb0f07c5d290ae394b60f17a117c75.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9e60de921d09472b17a0e0e92a159c63b5cb0f07c5d290ae394b60f17a117c75.exe
Resource
win10v2004-20240412-en
General
-
Target
8b303a6159b0bec7c19f1491762acbe19cd17e95eec50a484dd77cba9d622113
-
Size
152KB
-
MD5
dafd4c80c409ad99725912113c77d1c7
-
SHA1
062ce8026043c52ebba5a08fb9fc2824c9a40d50
-
SHA256
8b303a6159b0bec7c19f1491762acbe19cd17e95eec50a484dd77cba9d622113
-
SHA512
e028f831b92e5d3dc444641fdd55860d24df7084a2bb0b56bfd50fbd6fbdf5dca607a34a578a733c72bc1ed4d3f533ee0a20733269490c50a07ede6aa49f7216
-
SSDEEP
3072:iyoPmG0sf9PFs6pNN5fpr3RCKeEj0WSU99W3/vZB5dGBgwxNiXniOvU:iyouB+FsAr33j0WFnGB5dTwxNiXikU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/9e60de921d09472b17a0e0e92a159c63b5cb0f07c5d290ae394b60f17a117c75.exe
Files
-
8b303a6159b0bec7c19f1491762acbe19cd17e95eec50a484dd77cba9d622113.zip
Password: infected
-
9e60de921d09472b17a0e0e92a159c63b5cb0f07c5d290ae394b60f17a117c75.exe.exe windows:5 windows x86 arch:x86
fd86837b412a078790d17ffcd4950899
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileSize
WriteConsoleOutputCharacterW
GetConsoleAliasExesLengthA
HeapAlloc
ZombifyActCtx
CreateHardLinkA
GetDateFormatA
WideCharToMultiByte
LoadLibraryW
GetFileAttributesA
GetModuleFileNameW
CompareStringW
CreateJobObjectA
InterlockedExchange
SetThreadLocale
GetLastError
GetProcessHeaps
CreateNamedPipeA
GetConsoleDisplayMode
GetAtomNameA
UnhandledExceptionFilter
LocalAlloc
DnsHostnameToComputerNameA
WritePrivateProfileStringA
AddAtomW
FindAtomA
BuildCommDCBA
VirtualProtect
GetCurrentDirectoryA
FatalAppExitA
SetThreadAffinityMask
ReleaseMutex
FileTimeToLocalFileTime
HeapReAlloc
GetCommandLineW
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
HeapCreate
HeapFree
GetProcAddress
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
Sleep
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
HeapSize
IsProcessorFeaturePresent
LCMapStringW
MultiByteToWideChar
GetStringTypeW
RaiseException
user32
CopyRect
LoadIconW
Sections
.text Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 144KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 293KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ