Static task
static1
Behavioral task
behavioral1
Sample
22e81782e13556ff0e50f878303b5e66953379dee68d0f5314762585a59781a3.exe
Resource
win7-20240215-en
General
-
Target
bfb37740b231fce75a2a66a53afeaa2ccde3d99d0f49daacbf09c2bc9b901e6e
-
Size
195KB
-
MD5
8c5d7519f60f8149bb921bd13b159145
-
SHA1
b46f1e8dc1ed3632af9ebc4181b7c38f39b6acc7
-
SHA256
bfb37740b231fce75a2a66a53afeaa2ccde3d99d0f49daacbf09c2bc9b901e6e
-
SHA512
28728077276cc2b5ce350d8afa32162fdc1232f4df08b12294b4471a75ce4924303589ac5a4113bcddced9395366639a94486a7ddc200022ded6e36fcec1853f
-
SSDEEP
6144:ttAgDnaO+KkLvTXVK3orQLB6DoGvS9QLvooBk6I:tpDnzwTXk4rQV6kGvSyLzm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/22e81782e13556ff0e50f878303b5e66953379dee68d0f5314762585a59781a3.exe
Files
-
bfb37740b231fce75a2a66a53afeaa2ccde3d99d0f49daacbf09c2bc9b901e6e.zip
Password: infected
-
22e81782e13556ff0e50f878303b5e66953379dee68d0f5314762585a59781a3.exe.exe windows:5 windows x86 arch:x86
6be5417022f6f99bf1a18af9936298b9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedIncrement
InterlockedDecrement
WaitForSingleObject
SetEvent
GetModuleHandleW
GetTickCount
FindNextVolumeMountPointA
GlobalAlloc
LoadLibraryW
GetLocaleInfoW
GetFileAttributesA
HeapValidate
GetACP
GetConsoleOutputCP
GetLastError
GetCurrentDirectoryW
GetProcAddress
HeapAlloc
SetComputerNameA
GetAtomNameA
LoadLibraryA
UnhandledExceptionFilter
OpenWaitableTimerW
CreateHardLinkW
GlobalFindAtomW
CreatePipe
ConvertDefaultLocale
GetModuleFileNameA
SetConsoleTitleW
HeapSetInformation
SetCalendarInfoA
FindAtomW
CloseHandle
CreateFileW
HeapSize
GetNumaProcessorNode
EncodePointer
DecodePointer
HeapReAlloc
ExitProcess
GetCommandLineA
GetStartupInfoW
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
Sleep
HeapFree
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
GetConsoleCP
GetConsoleMode
GetCPInfo
GetOEMCP
IsValidCodePage
RtlUnwind
SetStdHandle
WriteConsoleW
MultiByteToWideChar
LCMapStringW
GetStringTypeW
IsProcessorFeaturePresent
FlushFileBuffers
user32
GetMonitorInfoA
advapi32
GetPrivateObjectSecurity
ole32
CoTaskMemFree
winhttp
WinHttpOpen
Sections
.text Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 179KB - Virtual size: 178KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ