Behavioral task
behavioral1
Sample
28135bb818682c71869768c1105e91595367c2f633c6e68b8c2ccb8611911972.exe
Resource
win7-20240221-en
General
-
Target
bca33b43134eedcf263d6d7febd81775c71585873458884d0ce025cb348a7009
-
Size
8KB
-
MD5
2155dcf7c7f3b5fec04332083bb904c7
-
SHA1
4acdcc31423dc211ddca059bc67d73fc4e122976
-
SHA256
bca33b43134eedcf263d6d7febd81775c71585873458884d0ce025cb348a7009
-
SHA512
f874b2171e62f95e559dfc6756813edb060157a528812cce732d8480f6eb66e4ee64e9ddabcdf923b17b9731b02bf6640229e52b393a0ab6db3ad3762abdff03
-
SSDEEP
192:4yvV1SAJ/TtcoKVime40sut8KYxuzSIZ+qUQsricZ:44HSAJ/T1me4S8luz+nQsu6
Malware Config
Extracted
systembc
45.140.147.91:4001
Signatures
-
Systembc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/28135bb818682c71869768c1105e91595367c2f633c6e68b8c2ccb8611911972.exe
Files
-
bca33b43134eedcf263d6d7febd81775c71585873458884d0ce025cb348a7009.zip
Password: infected
-
28135bb818682c71869768c1105e91595367c2f633c6e68b8c2ccb8611911972.exe.exe windows:4 windows x86 arch:x86
b83b4c7be0b1cdd8e117bba9096d9768
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetMessageA
GetWindowTextA
GetWindowThreadProcessId
LoadCursorA
LoadIconA
CreateWindowExA
RegisterClassA
SendMessageA
ShowWindow
TranslateMessage
UpdateWindow
GetClassNameA
EnumWindows
DispatchMessageA
DefWindowProcA
wsprintfA
kernel32
ResetEvent
SetEvent
SetFilePointer
OpenProcess
RemoveDirectoryA
LocalAlloc
WriteFile
WaitForSingleObject
VirtualFree
VirtualAlloc
SystemTimeToFileTime
CloseHandle
CopyFileA
CreateDirectoryA
CreateEventA
CreateFileA
CreateMutexA
CreateThread
CreateToolhelp32Snapshot
DeleteFileA
ExitProcess
FileTimeToSystemTime
GetCommandLineW
GetCurrentProcess
GetCurrentProcessId
GetEnvironmentVariableA
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetTempPathA
GetVolumeInformationA
LocalFree
Sleep
advapi32
GetSidSubAuthority
GetUserNameW
OpenProcessToken
GetTokenInformation
wsock32
htons
inet_addr
inet_ntoa
recv
select
send
setsockopt
shutdown
socket
connect
closesocket
ioctlsocket
WSAStartup
WSACleanup
shell32
CommandLineToArgvW
ws2_32
freeaddrinfo
WSAIoctl
getaddrinfo
ole32
CoUninitialize
CoInitialize
CoCreateInstance
secur32
GetUserNameExW
QueryContextAttributesA
AcquireCredentialsHandleA
DecryptMessage
DeleteSecurityContext
EncryptMessage
FreeContextBuffer
FreeCredentialsHandle
GetUserNameExA
InitializeSecurityContextA
psapi
GetModuleFileNameExA
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 812B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE