Static task
static1
Behavioral task
behavioral1
Sample
b9dd5b5112232c3266b326271d24c2d8af866a386c34fb2d4cd3c414f995b587.exe
Resource
win7-20240215-en
General
-
Target
b925d55a775cc1a729ef3b5f7f7c3a34da519b42e6cae816ad9ed2e1d3a700aa
-
Size
173KB
-
MD5
b11bc190442356d7d40585cd68b74c9c
-
SHA1
0de9f32347a2aa209fb9864d92913de21b060ded
-
SHA256
b925d55a775cc1a729ef3b5f7f7c3a34da519b42e6cae816ad9ed2e1d3a700aa
-
SHA512
608c7d655729a7d879a1561fda76f8fdc8cda07160110542feedad0ab6bfde7bd3c0fd8d30c6d46c5683c9706b2f6e84b44228930bd4a8ece187a7d92558df63
-
SSDEEP
3072:A38uSuJoXIJuja8/HpJ1rI7pGJ/5pmrnAhVOHTBB7m2y2rDWxmNY5wZRSJhx7m2E:C2XIJuZHpJ1rI9GLpmDwe1Bi/230mNLL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/b9dd5b5112232c3266b326271d24c2d8af866a386c34fb2d4cd3c414f995b587.exe
Files
-
b925d55a775cc1a729ef3b5f7f7c3a34da519b42e6cae816ad9ed2e1d3a700aa.zip
Password: infected
-
b9dd5b5112232c3266b326271d24c2d8af866a386c34fb2d4cd3c414f995b587.exe.exe windows:5 windows x86 arch:x86
2d3b460caa86ad92cecbea0585c3a401
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemDefaultLangID
GetFileSize
WriteConsoleOutputCharacterW
GetConsoleAliasExesLengthA
LocalCompact
SystemTimeToTzSpecificLocalTime
HeapAlloc
ZombifyActCtx
CreateJobObjectW
InterlockedCompareExchange
CreateHardLinkA
CreateNamedPipeW
WideCharToMultiByte
LoadLibraryW
GetFileAttributesW
GetModuleFileNameW
GetLastError
GetProcessHeaps
SetStdHandle
BuildCommDCBW
LoadLibraryA
UnhandledExceptionFilter
LocalAlloc
DeleteTimerQueue
AddAtomW
VirtualProtect
GetCurrentDirectoryA
CompareStringA
FatalAppExitA
ReleaseMutex
FileTimeToLocalFileTime
GlobalAddAtomW
GetStringTypeW
GetCommandLineW
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
IsProcessorFeaturePresent
GetProcAddress
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RaiseException
LeaveCriticalSection
EnterCriticalSection
HeapFree
Sleep
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
HeapSize
HeapReAlloc
LCMapStringW
MultiByteToWideChar
user32
GetKeyboardState
LoadIconW
GetClassLongW
Sections
.text Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 179KB - Virtual size: 179KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bube Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ