Static task
static1
Behavioral task
behavioral1
Sample
03b8ef63390d4611b8caf0670192d03037c0ab000ab9ac4af49fb10043b2a34b.exe
Resource
win7-20240215-en
General
-
Target
3809630992fd40ecc6640488fd42aed7a6143a37d79683b8ab8e454c7e4c0506
-
Size
189KB
-
MD5
e3a1464eb89398b6da9f65ac354ea1ab
-
SHA1
50132d31e4528e39ffb0ac491994af537fa7179c
-
SHA256
3809630992fd40ecc6640488fd42aed7a6143a37d79683b8ab8e454c7e4c0506
-
SHA512
1a44f674d33ece022d744961faedb36420f3e9759e323484181b54704a153e500a9208cd2904c7c6c2329710dc583830c5814bb1d013263ef3c7d9940ac8667c
-
SSDEEP
3072:dU5ZxsYUACTlI3bdq7PjuPuyVoFoL2l2Czm8KA9qoDCd1W8/YCQhvwgRVekys9SV:dWzsYlbIjjuGyu2CavOGd1WIYpwg2kyh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/03b8ef63390d4611b8caf0670192d03037c0ab000ab9ac4af49fb10043b2a34b.exe
Files
-
3809630992fd40ecc6640488fd42aed7a6143a37d79683b8ab8e454c7e4c0506.zip
Password: infected
-
03b8ef63390d4611b8caf0670192d03037c0ab000ab9ac4af49fb10043b2a34b.exe.exe windows:5 windows x86 arch:x86
259a6e708819808bcdd9e3fe675c29a3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SystemTimeToTzSpecificLocalTime
HeapAlloc
SystemTimeToFileTime
MoveFileExW
InterlockedDecrement
CreateDirectoryW
GetUserDefaultLCID
GetComputerNameW
GetConsoleAliasesLengthA
GetLocaleInfoW
FatalAppExitW
GetTapePosition
ReplaceFileW
LocalHandle
GetTimeZoneInformation
ReleaseSemaphore
GetConsoleOutputCP
GetStdHandle
GetCurrentDirectoryW
WriteConsoleOutputCharacterA
CreateNamedPipeA
CreateTimerQueueTimer
SetStdHandle
LoadLibraryA
LocalAlloc
AddAtomA
lstrcatW
FreeEnvironmentStringsW
VirtualProtect
GetFileTime
FindAtomW
SetFileAttributesW
GetVolumeInformationW
CreateFileW
WriteConsoleW
SetFilePointer
GetStringTypeW
GetConsoleAliasExesLengthA
GetProcessIoCounters
DebugActiveProcessStop
SetLastError
GetLocaleInfoA
GetLastError
HeapFree
EncodePointer
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapCreate
Sleep
HeapSize
GetProcAddress
GetModuleHandleW
ExitProcess
EnterCriticalSection
LeaveCriticalSection
CloseHandle
WriteFile
GetModuleFileNameW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RaiseException
HeapReAlloc
LoadLibraryW
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LCMapStringW
MultiByteToWideChar
user32
SetKeyboardState
CreateIcon
GetClassLongA
SetActiveWindow
gdi32
GetBoundsRect
advapi32
OpenThreadToken
GetAce
Sections
.text Size: 195KB - Virtual size: 195KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 30.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ