Static task
static1
Behavioral task
behavioral1
Sample
1de489805895c5c666547d588f1d762dbc28b6be48002b99e3404957ecf8fc08.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1de489805895c5c666547d588f1d762dbc28b6be48002b99e3404957ecf8fc08.exe
Resource
win10v2004-20240226-en
General
-
Target
3821a14f4e99603b476a9effed3ce1c345272832ff42ae0af3c62f263ef7b524
-
Size
136KB
-
MD5
5caa5af7fe7a2aded3aefd306f5519fb
-
SHA1
b6eff39477a7a76d58aeeacd3162c54d197a5583
-
SHA256
3821a14f4e99603b476a9effed3ce1c345272832ff42ae0af3c62f263ef7b524
-
SHA512
4426db019061734fc7539d09e5132c6ec3c34ef8eaecf42ba8b17516b4e64a907e7199263a359cb6d43540b00fe8dcf3ff53d2cd4001933c910cffe96fbd038d
-
SSDEEP
3072:DncYY850yjt96+tdJRCJuaVQnKdXR0OdYfw2VtMD+N:DncIe/+tdJ+udKdXRTkE8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/1de489805895c5c666547d588f1d762dbc28b6be48002b99e3404957ecf8fc08.exe
Files
-
3821a14f4e99603b476a9effed3ce1c345272832ff42ae0af3c62f263ef7b524.zip
Password: infected
-
1de489805895c5c666547d588f1d762dbc28b6be48002b99e3404957ecf8fc08.exe.exe windows:5 windows x86 arch:x86
cb42cdcfc60d1d7d29fcef2a22a6efc8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleAliasExesLengthA
HeapAlloc
FreeEnvironmentStringsA
GetModuleHandleW
GetTickCount
GetConsoleAliasesA
LoadLibraryW
GetLocaleInfoW
GetAtomNameW
GetModuleFileNameW
CompareStringW
IsBadStringPtrA
SetConsoleTitleA
WritePrivateProfileStringW
RaiseException
FindResourceA
GetLastError
GetProcAddress
GetTapeStatus
SetComputerNameA
OpenWaitableTimerA
LoadLibraryA
LocalAlloc
SetCalendarInfoW
OpenJobObjectW
DebugSetProcessKillOnExit
GetStringTypeW
CompareStringA
UnregisterWaitEx
LocalFree
InterlockedExchange
GetEnvironmentVariableW
HeapFree
GetCommandLineW
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
HeapDestroy
ExitProcess
DecodePointer
WriteFile
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
SetConsoleCtrlHandler
FreeLibrary
Sleep
RtlUnwind
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
HeapSize
HeapReAlloc
IsProcessorFeaturePresent
advapi32
OpenEventLogW
Sections
.text Size: 127KB - Virtual size: 126KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ