Static task
static1
Behavioral task
behavioral1
Sample
7e8c547fcc86e26b973e4c974da8ee2c4cfe84846e2cdfcd7f265929d27602f9.exe
Resource
win7-20240220-en
General
-
Target
257ddc2a561d253c99fbb9d4cf71c5f6bcd3ab79441bcbab4806bd6d1d3e93fc
-
Size
376KB
-
MD5
f6eee1aff41cc3a32e6f375cbb907b90
-
SHA1
fa92551b4d1ebf97b5ff364632bf0021bcc81a9c
-
SHA256
257ddc2a561d253c99fbb9d4cf71c5f6bcd3ab79441bcbab4806bd6d1d3e93fc
-
SHA512
35a8777e130759d4585681e3952aca51523baee3f02dd09d86e53f31a2b1eac7ff81fd52eff390a2710df738a44bce9f7f2bccb7acea509f86722caa6090d9d2
-
SSDEEP
6144:GKa1sC1BVmHHnFOcKP4kI74Sm2e2p121lZN45BRdaeQxrityIkfPHb2yRJ:BaVVKKu4S4lZSBRdaprityzfiyH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/7e8c547fcc86e26b973e4c974da8ee2c4cfe84846e2cdfcd7f265929d27602f9.exe
Files
-
257ddc2a561d253c99fbb9d4cf71c5f6bcd3ab79441bcbab4806bd6d1d3e93fc.zip
Password: infected
-
7e8c547fcc86e26b973e4c974da8ee2c4cfe84846e2cdfcd7f265929d27602f9.exe.exe windows:4 windows x86 arch:x86
46111b1241c22aa3ede6b4176531c30a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
MultiByteToWideChar
lstrlenA
CloseHandle
GetModuleFileNameA
MapViewOfFile
CreateFileMappingW
ExitProcess
CopyFileW
GetModuleFileNameW
GetProcAddress
LoadLibraryW
LockResource
SizeofResource
LoadResource
FindResourceA
InterlockedDecrement
FlushFileBuffers
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
InterlockedIncrement
GetConsoleMode
GetConsoleCP
SetFilePointer
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
InitializeCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
WideCharToMultiByte
LocalFree
HeapFree
RtlUnwind
HeapAlloc
RaiseException
GetCommandLineA
GetVersionExA
GetProcessHeap
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
WriteFile
GetStdHandle
Sleep
HeapSize
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
user32
MessageBoxA
EndPaint
DefWindowProcA
PeekMessageA
BeginPaint
TranslateMessage
DispatchMessageA
LoadIconA
LoadCursorA
RegisterClassA
GetMessageA
DestroyWindow
PostQuitMessage
AdjustWindowRect
CreateWindowExA
ShowWindow
UpdateWindow
GetDC
gdi32
TextOutA
shell32
ShellExecuteW
ole32
OleRun
CoCreateInstance
CoInitialize
CLSIDFromProgID
CLSIDFromString
oleaut32
SysStringByteLen
SysAllocStringByteLen
VariantClear
VariantChangeType
VariantInit
SysFreeString
SysAllocString
GetErrorInfo
Sections
.text Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 304KB - Virtual size: 301KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ