Static task
static1
Behavioral task
behavioral1
Sample
7682ec1cc9155e1dfa2ec2817f0510ac3f66800299088143f8a6b58eeb9a96c8.exe
Resource
win7-20240221-en
General
-
Target
7682ec1cc9155e1dfa2ec2817f0510ac3f66800299088143f8a6b58eeb9a96c8.zip
-
Size
301KB
-
MD5
9328acd9689e01744ac01313bdda7f8f
-
SHA1
b8296cd532552aae0c6b0fe858103ddc4491b0dd
-
SHA256
6db80e6a112cee8e56cb2b9f4d6e042d21e1ad731aea24eddcbe4b046230fd33
-
SHA512
0f0a2ecce7d500a6473c90a7ede77a07afaf30272ba5a40129281a5a65415ffa0047e819cce2446922ba4a1ef781633edf599cf6691657c02d878ae77109cce8
-
SSDEEP
6144:l0pZH8eUM0PP5rd3azNA6pEKgQ/Ib3O0y+dBJx/w5gOKiIr/t2cLQLDlf:gHIMy0y6ptPAb3Oq/J7BbQL5f
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/7682ec1cc9155e1dfa2ec2817f0510ac3f66800299088143f8a6b58eeb9a96c8
Files
-
7682ec1cc9155e1dfa2ec2817f0510ac3f66800299088143f8a6b58eeb9a96c8.zip.zip
Password: infected
-
7682ec1cc9155e1dfa2ec2817f0510ac3f66800299088143f8a6b58eeb9a96c8.exe windows:6 windows x86 arch:x86
82e42f5924d8f42ac2ff5a3351baf140
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
GetStdHandle
QueryPerformanceCounter
QueryPerformanceFrequency
user32
GetDC
ReleaseDC
gdi32
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
DeleteDC
DeleteObject
GetDIBits
GetDeviceCaps
GetObjectW
SelectObject
Sections
.text Size: 354KB - Virtual size: 353KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
wnthvk Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE