Static task
static1
Behavioral task
behavioral1
Sample
cb509d8ab6bd2420904a66d6485419a6847da6d7c52e0eff4e8878c30423492b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cb509d8ab6bd2420904a66d6485419a6847da6d7c52e0eff4e8878c30423492b.exe
Resource
win10v2004-20240412-en
General
-
Target
10b27caf9166f510e4dc70a2f3de22bb60e6476093b6dfcab37e14162e41bd64
-
Size
147KB
-
MD5
33dbf93a3a84b583d18c6dc8d2fdade3
-
SHA1
5843e5e1d7a6940005426ddba68e27fe6440d1d0
-
SHA256
10b27caf9166f510e4dc70a2f3de22bb60e6476093b6dfcab37e14162e41bd64
-
SHA512
aa9163ef91b698c246f35645ca6b118ca7d3de1d1f2a93668ba4a774a4d24fa55bb1b93ff07276df85760d55a7b44fdae2c6893baeaf6f0e548c8ca0026ba199
-
SSDEEP
3072:TUeukMOEewKM7D23LMPpFr8rXtxeqn2Icbumw:T7uDOEF/7DUL2Fr8Dt9t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/cb509d8ab6bd2420904a66d6485419a6847da6d7c52e0eff4e8878c30423492b.exe
Files
-
10b27caf9166f510e4dc70a2f3de22bb60e6476093b6dfcab37e14162e41bd64.zip
Password: infected
-
cb509d8ab6bd2420904a66d6485419a6847da6d7c52e0eff4e8878c30423492b.exe.exe windows:5 windows x86 arch:x86
eca83d04a8476bcc568e22f1bc0330c0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsGetValue
GetConsoleAliasExesLengthA
LocalCompact
GetTickCount
LocalFlags
GetConsoleAliasesA
LoadLibraryW
GetLocaleInfoW
HeapCreate
GetAtomNameW
IsBadStringPtrA
SetConsoleTitleA
WritePrivateProfileStringW
RaiseException
InterlockedExchange
FindResourceA
SetLastError
GetProcAddress
SetComputerNameA
SetFileAttributesA
LoadLibraryA
OpenWaitableTimerW
LocalAlloc
GetTapeParameters
GetModuleFileNameA
EraseTape
FreeEnvironmentStringsW
CompareStringA
SetCalendarInfoA
LocalFree
GetLastError
GetEnvironmentVariableW
EncodePointer
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapFree
IsProcessorFeaturePresent
Sleep
HeapSize
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
HeapDestroy
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapReAlloc
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
SetConsoleCtrlHandler
FreeLibrary
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
advapi32
OpenEventLogA
Sections
.text Size: 166KB - Virtual size: 165KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ