Static task
static1
Behavioral task
behavioral1
Sample
b52028609b92de2f7a3621621f2d3b3de11f48c16b1d612ad2efebb2af4af2a2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b52028609b92de2f7a3621621f2d3b3de11f48c16b1d612ad2efebb2af4af2a2.exe
Resource
win10v2004-20240412-en
General
-
Target
8b2702fe10360967a70982a37b3b33bbdc16b42773b6405c0469f37bbc9f1dce
-
Size
148KB
-
MD5
f4ea979362e9a2d75b6d8b201bca124c
-
SHA1
4d2c1e8ec841e8f39ff5231562c6f999504d1e37
-
SHA256
8b2702fe10360967a70982a37b3b33bbdc16b42773b6405c0469f37bbc9f1dce
-
SHA512
43b6c3d5ba2ce23899f6c0372415b1ac6580034ebb7af00edb1b41a713a1c529bb668d6a17934e302064b6a93403f71f4af68d7d773724c085cb7db13c4ed4ed
-
SSDEEP
3072:lcteURtsrxgYqkdHHRijFdaY1mo1abqsStmn2gGLpw:lctemtOxjHROkoIbqN3gAa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/b52028609b92de2f7a3621621f2d3b3de11f48c16b1d612ad2efebb2af4af2a2.exe
Files
-
8b2702fe10360967a70982a37b3b33bbdc16b42773b6405c0469f37bbc9f1dce.zip
Password: infected
-
b52028609b92de2f7a3621621f2d3b3de11f48c16b1d612ad2efebb2af4af2a2.exe.exe windows:5 windows x86 arch:x86
c2ef8d3e41174217744d73a64eadb475
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsGetValue
GetConsoleAliasExesLengthA
LocalCompact
GetTickCount
LocalFlags
GetConsoleAliasesA
LoadLibraryW
GetLocaleInfoW
HeapDestroy
GetAtomNameW
IsBadStringPtrA
SetConsoleTitleA
WritePrivateProfileStringW
RaiseException
InterlockedExchange
GetLastError
SetLastError
FindResourceA
SetComputerNameA
SetFileAttributesA
LoadLibraryA
OpenWaitableTimerW
LocalAlloc
GetTapeParameters
GetModuleFileNameA
EraseTape
FreeEnvironmentStringsW
CompareStringA
SetCalendarInfoA
LocalFree
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeW
GetProcAddress
GetEnvironmentVariableW
EncodePointer
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapFree
IsProcessorFeaturePresent
Sleep
HeapSize
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapReAlloc
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
SetConsoleCtrlHandler
FreeLibrary
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
MultiByteToWideChar
IsValidLocale
user32
SetKeyboardState
GetMonitorInfoA
SetActiveWindow
advapi32
OpenEventLogA
Sections
.text Size: 168KB - Virtual size: 168KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ