Static task
static1
Behavioral task
behavioral1
Sample
a6b9710a78f50e1083d7e4c543c477fd6331c7ca47a50c71a182160e5741c1b6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a6b9710a78f50e1083d7e4c543c477fd6331c7ca47a50c71a182160e5741c1b6.exe
Resource
win10v2004-20240419-en
General
-
Target
59fd7df4625ce3480e806144a007080f.bin
-
Size
288KB
-
MD5
826acf1a10676d89942b5fb41a8aaa99
-
SHA1
746b5282d5de633ffcd6ac486a2bd5eff4b5b66c
-
SHA256
19c25bd6ef042acbf3ec1e8e32e0801fd6364bf77d71194c0791bd58eca2abf7
-
SHA512
eeb71f573d4975ae7e95b47b1393af50e58be237fed7c8ba7310a433fb793f3e7e3ceb759759cb83fe36dbf7c57bf3a5208d4a1e39d2a39910c23d112609e6b9
-
SSDEEP
6144:rz7TzhoMafG4bgDA/y8QZUFjR9xI+Ckaa5IK7+9B1U1s:/bpa+4key8QZOlzI+Ck5I0+f1U1s
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/a6b9710a78f50e1083d7e4c543c477fd6331c7ca47a50c71a182160e5741c1b6.exe
Files
-
59fd7df4625ce3480e806144a007080f.bin.zip
Password: infected
-
a6b9710a78f50e1083d7e4c543c477fd6331c7ca47a50c71a182160e5741c1b6.exe.exe windows:4 windows x86 arch:x86
Password: infected
a0158c18d7c57554131cbbf4101b1cab
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
GetProcessHeap
VirtualAlloc
VirtualProtect
VirtualFree
GetProcAddress
LoadLibraryA
IsBadReadPtr
HeapFree
FreeLibrary
IsBadWritePtr
HeapValidate
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
DebugBreak
GetStdHandle
WriteFile
InterlockedDecrement
OutputDebugStringA
InterlockedIncrement
GetModuleFileNameA
HeapReAlloc
GetLastError
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
RtlUnwind
SetConsoleCtrlHandler
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetCPInfo
GetACP
GetOEMCP
SetFilePointer
LCMapStringA
LCMapStringW
SetStdHandle
FlushFileBuffers
CloseHandle
Sections
.text Size: 136KB - Virtual size: 134KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 196KB - Virtual size: 202KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 220KB - Virtual size: 216KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ