Static task
static1
Behavioral task
behavioral1
Sample
1d3f2ba1c701ecf04c288b64d9f2470c6f58744d5284174c1cb8e8b3753f3fae.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1d3f2ba1c701ecf04c288b64d9f2470c6f58744d5284174c1cb8e8b3753f3fae.exe
Resource
win10v2004-20240412-en
General
-
Target
17d8b60e09d1e8861b7e64291ccd2a57d8557fad1abbb8dff48b0c6c6ef1f606
-
Size
48KB
-
MD5
95f416eebdbc5ef410b74da576445123
-
SHA1
0a1a9410f38f9f967889da87f232a8aa2ad1a1fb
-
SHA256
17d8b60e09d1e8861b7e64291ccd2a57d8557fad1abbb8dff48b0c6c6ef1f606
-
SHA512
5171ca3ab0fa38447015137ff643b25d523cb27c8bd781e0d7cc1176a3141faea974251ed39c398dc3c4c72505010ce9d84d9ad571373db90475856822152707
-
SSDEEP
1536:9sZUiaC3lKqFp4QvaRFfZ9ADB2lkUx9BaIBoh9o:940CM8p4oc3Ao+Ux95k9o
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/1d3f2ba1c701ecf04c288b64d9f2470c6f58744d5284174c1cb8e8b3753f3fae
Files
-
17d8b60e09d1e8861b7e64291ccd2a57d8557fad1abbb8dff48b0c6c6ef1f606.zip
Password: infected
-
1d3f2ba1c701ecf04c288b64d9f2470c6f58744d5284174c1cb8e8b3753f3fae.exe windows:5 windows x86 arch:x86
30cf701f0c0e93694fb86fa8e4edea9e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitThread
Process32First
WaitForSingleObject
GetTickCount
WideCharToMultiByte
GetModuleFileNameW
MultiByteToWideChar
GetLastError
Process32Next
GlobalMemoryStatusEx
GetComputerNameA
CreateMutexA
CreateToolhelp32Snapshot
GetDiskFreeSpaceExA
GetDriveTypeA
GetLogicalDrives
CreateThread
SetFileAttributesW
CloseHandle
FindNextFileW
lstrcmpiW
WaitForMultipleObjects
FindClose
GlobalFree
MoveFileW
GetFileSizeEx
CreateFileW
ReadFile
GetFileAttributesW
Sleep
GlobalAlloc
WriteFile
SetFilePointerEx
SetFilePointer
GetStringTypeW
LCMapStringW
IsValidCodePage
GetOEMCP
FindFirstFileW
ExitProcess
GetACP
GetCPInfo
RtlUnwind
LoadLibraryW
EnterCriticalSection
LeaveCriticalSection
HeapReAlloc
EncodePointer
DecodePointer
HeapAlloc
GetSystemTimeAsFileTime
GetCommandLineA
HeapSetInformation
RaiseException
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapSize
GetProcAddress
GetModuleHandleW
HeapFree
GetStdHandle
HeapCreate
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
QueryPerformanceCounter
GetCurrentProcessId
user32
CharUpperA
advapi32
CryptImportKey
CryptExportKey
CryptDecrypt
CryptDeriveKey
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
CryptEncrypt
CryptGetHashParam
GetUserNameA
GetCurrentHwProfileA
CryptHashData
CryptDestroyHash
CryptDestroyKey
CryptGenKey
CryptCreateHash
CryptAcquireContextA
CryptReleaseContext
shell32
ShellExecuteA
SHGetFolderPathW
ShellExecuteW
SHEmptyRecycleBinA
crypt32
CryptStringToBinaryA
CryptBinaryToStringA
wininet
InternetOpenA
InternetCloseHandle
InternetOpenUrlA
InternetReadFile
mpr
WNetOpenEnumW
WNetEnumResourceW
WNetCloseEnum
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ