Static task
static1
Behavioral task
behavioral1
Sample
97d96881923faf0f965623a5097bb5e7bd87ecce22fe496e17da1242f0fb8930.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
97d96881923faf0f965623a5097bb5e7bd87ecce22fe496e17da1242f0fb8930.exe
Resource
win10v2004-20240412-en
General
-
Target
1f7d38a9b1f85843ef87d716ddeee8039aabeb4b470940e8c3c4bb7317ac4136
-
Size
136KB
-
MD5
190b0f6e87da11ac10dac5cf4ed76f01
-
SHA1
7c67ecff9093424655cb661b445e9ae589b29d00
-
SHA256
1f7d38a9b1f85843ef87d716ddeee8039aabeb4b470940e8c3c4bb7317ac4136
-
SHA512
77577d18e8cb3dda74a1672d924bc83246879801552d4de6bb58a4cc75b560089a5baecccc7f50843d664d7e3487d05aefb3da36ecb0ce6bae60e286b3dfbbea
-
SSDEEP
3072:Un/sdcoSLqH+zTNFaWbcrrMK1v2TkIZCjimoo8xLL3zdYHp:U/qHCz7bcrrMo2gI4imle5yp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/97d96881923faf0f965623a5097bb5e7bd87ecce22fe496e17da1242f0fb8930.exe
Files
-
1f7d38a9b1f85843ef87d716ddeee8039aabeb4b470940e8c3c4bb7317ac4136.zip
Password: infected
-
97d96881923faf0f965623a5097bb5e7bd87ecce22fe496e17da1242f0fb8930.exe.exe windows:5 windows x86 arch:x86
63d0afcd26c2db3e8a1c86e73126f393
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsBadStringPtrW
GetLocaleInfoA
HeapAlloc
FreeEnvironmentStringsA
GetModuleHandleW
GetTickCount
GetConsoleAliasesA
TlsSetValue
LoadLibraryW
LocalShrink
GetConsoleAliasExesLengthW
GetAtomNameW
GetModuleFileNameW
CompareStringW
SetConsoleTitleA
FindResourceA
RaiseException
InterlockedExchange
GetLastError
GetProcAddress
SetComputerNameA
PrepareTape
LoadLibraryA
OpenWaitableTimerW
LocalAlloc
SetCalendarInfoW
OpenJobObjectW
GetTapeParameters
CompareStringA
LocalFree
WritePrivateProfileStringW
GetEnvironmentVariableW
HeapFree
GetCommandLineW
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
HeapDestroy
ExitProcess
DecodePointer
WriteFile
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
EncodePointer
TlsAlloc
TlsGetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
SetConsoleCtrlHandler
FreeLibrary
GetLocaleInfoW
Sleep
RtlUnwind
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
HeapSize
HeapReAlloc
IsProcessorFeaturePresent
advapi32
OpenEventLogW
Sections
.text Size: 127KB - Virtual size: 126KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ