Static task
static1
Behavioral task
behavioral1
Sample
2f4e51dacadfa0f435684aea798967d63adea5f31e997cde89eed60ba4e9e364.exe
Resource
win7-20240221-en
General
-
Target
07f9f59660ab1aa688c9a0d7b8a04d332b470513994ec8953022bc860e9f9348
-
Size
213KB
-
MD5
58c189c3806a9a2bc53421fa526baa11
-
SHA1
f9d09dd2213d8e5b533ae1a81b3d533770761ecd
-
SHA256
07f9f59660ab1aa688c9a0d7b8a04d332b470513994ec8953022bc860e9f9348
-
SHA512
e5d826b6b2f233e20a65ddd76fa80dfe3902f42c3ab9ce4f5acdb104e46f157b1e473c17d6b2dfe9ceb35355d492a49e949ffb7033f2325ab087768feb922543
-
SSDEEP
3072:HKZ+G5SGz6oHBmKWqeeHShkPV0TSVnOuwk37fAfyDAfEEALkCFXP/BP7kD7WC8:q8G9zWQHp90+tKk37DD0lOkCpiH8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/2f4e51dacadfa0f435684aea798967d63adea5f31e997cde89eed60ba4e9e364.exe
Files
-
07f9f59660ab1aa688c9a0d7b8a04d332b470513994ec8953022bc860e9f9348.zip
Password: infected
-
2f4e51dacadfa0f435684aea798967d63adea5f31e997cde89eed60ba4e9e364.exe.exe windows:5 windows x86 arch:x86
4c596ad645cc863a9d621a9b7d580fb0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetNumaProcessorNode
HeapAlloc
InterlockedIncrement
WaitForSingleObject
SetEvent
ConnectNamedPipe
GetModuleHandleW
GetTickCount
FindNextVolumeMountPointA
GlobalFindAtomA
LoadLibraryW
GetLocaleInfoW
GetFileAttributesA
HeapValidate
CreateFileW
GetConsoleOutputCP
GetLastError
GetCurrentDirectoryW
GetThreadLocale
GetProcAddress
HeapSize
SetComputerNameA
GetAtomNameA
LoadLibraryA
UnhandledExceptionFilter
SetCalendarInfoW
CreateHardLinkW
GetModuleFileNameA
SetConsoleTitleW
HeapSetInformation
FindAtomW
ReadFile
FlushFileBuffers
HeapReAlloc
GetCommandLineA
GetStartupInfoW
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
DecodePointer
EncodePointer
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
EnterCriticalSection
LeaveCriticalSection
HeapFree
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
Sleep
RtlUnwind
MultiByteToWideChar
SetStdHandle
WriteConsoleW
LCMapStringW
GetStringTypeW
IsProcessorFeaturePresent
CloseHandle
user32
GetMonitorInfoA
ole32
CoTaskMemFree
winhttp
WinHttpOpen
Sections
.text Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 180KB - Virtual size: 179KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ