Static task
static1
Behavioral task
behavioral1
Sample
6a345ac4726c427e82a2121ae310adce203aa39c1c3d7ce48f5670cb833345a8.exe
Resource
win7-20240215-en
General
-
Target
700261d0d7891e646766f6bcc5216bd79f582ea61aa876454c4e4f86b5711782
-
Size
180KB
-
MD5
89980b66cd9c62354b413e544339c8b8
-
SHA1
e94384ff1b3b0d9e93a213d4691520b8a77a4f37
-
SHA256
700261d0d7891e646766f6bcc5216bd79f582ea61aa876454c4e4f86b5711782
-
SHA512
969b35678c8a1ed69eb8096055e18f7647284b6904344541cddd22d576634ccf0142b21a55b3ca991734443010a5ce60e569941d9eb71d3156a887e2d4c5f2dc
-
SSDEEP
3072:CoMHBkllAwDeJ6iGtmS3TfsQo3o7AwdQwE7U3SzA2hedArC08zvTBUH2Fn+AtGv:ClHBQl7qTWmSjfstCASQw9YQA+0cvTmF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/6a345ac4726c427e82a2121ae310adce203aa39c1c3d7ce48f5670cb833345a8.exe
Files
-
700261d0d7891e646766f6bcc5216bd79f582ea61aa876454c4e4f86b5711782.zip
Password: infected
-
6a345ac4726c427e82a2121ae310adce203aa39c1c3d7ce48f5670cb833345a8.exe.exe windows:5 windows x86 arch:x86
79134121236a21f4a744fb6dd4238594
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDateFormatW
GetFileSize
GetConsoleAliasExesLengthA
WriteConsoleOutputCharacterA
HeapAlloc
ZombifyActCtx
CreateHardLinkA
WideCharToMultiByte
LoadLibraryW
GetFileAttributesW
GetModuleFileNameW
CompareStringW
CreateJobObjectA
InterlockedExchange
SetThreadLocale
GetLastError
GetProcessHeaps
CreateNamedPipeA
GetConsoleDisplayMode
BuildCommDCBW
GetNumaHighestNodeNumber
GetAtomNameA
UnhandledExceptionFilter
LocalAlloc
DnsHostnameToComputerNameA
WritePrivateProfileStringA
AddAtomW
FindAtomA
CreatePipe
VirtualProtect
GetCurrentDirectoryA
ReleaseMutex
FindAtomW
FileTimeToLocalFileTime
HeapReAlloc
GetCommandLineW
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
HeapCreate
HeapFree
GetProcAddress
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
Sleep
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
HeapSize
IsProcessorFeaturePresent
LCMapStringW
MultiByteToWideChar
GetStringTypeW
RaiseException
user32
CopyRect
LoadIconW
Sections
.text Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 180KB - Virtual size: 179KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dabikog Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ