Static task
static1
Behavioral task
behavioral1
Sample
cb1c506be26eb65bd7c79abc7e54d356adea2c3e0993e605e98cc39611f7add1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cb1c506be26eb65bd7c79abc7e54d356adea2c3e0993e605e98cc39611f7add1.exe
Resource
win10v2004-20240412-en
General
-
Target
e784b886059f077e303e48b572d98be151001e31fa09cef4264a083cd1822473
-
Size
141KB
-
MD5
960e4664daa29f117f471631d02621e2
-
SHA1
cafd44899db37340da115edbfd10e2599a07605a
-
SHA256
e784b886059f077e303e48b572d98be151001e31fa09cef4264a083cd1822473
-
SHA512
ff573857ddfcc6e325e9eff2bfeee15773055d7f8da6fff59ebed855a7647bf2beef3ce790a5e52e31ba5a8647744cbc4e4d23ddcb4eff0090ded84bf3b08d7c
-
SSDEEP
3072:nZyTwHnYSCvIv5xN1GKYlyplW8dsBsSAOTKxJV+kNlZZdFwpnXmDzW8Am:4UHYSCv2531GXlynBSwJgkvZZdFKn2J9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/cb1c506be26eb65bd7c79abc7e54d356adea2c3e0993e605e98cc39611f7add1.exe
Files
-
e784b886059f077e303e48b572d98be151001e31fa09cef4264a083cd1822473.zip
Password: infected
-
cb1c506be26eb65bd7c79abc7e54d356adea2c3e0993e605e98cc39611f7add1.exe.exe windows:5 windows x86 arch:x86
c060277555f1b0da4ad9d7285dda191d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameA
CreateFileA
SetDefaultCommConfigA
FindFirstFileW
SetLocaleInfoA
WriteConsoleInputW
HeapAlloc
UpdateResourceA
VerSetConditionMask
InterlockedDecrement
CreateJobObjectW
GetProfileSectionA
OutputDebugStringW
ReadConsoleW
GetCommandLineA
GlobalAlloc
TerminateThread
GetLocaleInfoW
ReadConsoleInputA
SetConsoleCP
GlobalFlags
WritePrivateProfileStructW
WriteConsoleW
CreateActCtxA
FindNextVolumeMountPointW
GetNamedPipeHandleStateW
GetCPInfoExW
GetLastError
GetProcAddress
HeapSize
PeekConsoleInputW
IsValidCodePage
VerLanguageNameW
LoadLibraryA
UnhandledExceptionFilter
OpenWaitableTimerW
GetConsoleScreenBufferInfo
IsWow64Process
BuildCommDCBAndTimeoutsW
GetNumberFormatW
GlobalFindAtomW
GetModuleHandleA
OpenFileMappingW
SetProcessShutdownParameters
LocalSize
GetWindowsDirectoryW
GlobalReAlloc
ExpandEnvironmentStringsW
CloseHandle
SetStdHandle
FlushFileBuffers
WideCharToMultiByte
InterlockedIncrement
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
GetStringTypeW
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapReAlloc
GetCommandLineW
HeapSetInformation
GetStartupInfoW
GetCPInfo
RaiseException
RtlUnwind
LCMapStringW
IsProcessorFeaturePresent
GetACP
GetOEMCP
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
HeapCreate
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
LoadLibraryW
SetFilePointer
GetConsoleCP
GetConsoleMode
CreateFileW
user32
CharToOemBuffW
CharUpperW
Sections
.text Size: 93KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 100KB - Virtual size: 3.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.joxahu Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ