Static task
static1
Behavioral task
behavioral1
Sample
2c4b9f1da660cc47a044ee56e82c9fcd7e2e37fce633db555679f3a225835009.exe
Resource
win7-20240221-en
General
-
Target
4095099f8dc01fa0e768c90bc5f6930b.bin
-
Size
2.3MB
-
MD5
1c0b283b8f3a25091997ba65a7e20be6
-
SHA1
48b58e9ec81e5c108382cd87680dde16107c97d0
-
SHA256
af3fb8a4cb92ec05d2b9a426ee5225d2adfebd4beb90ba16c8c7ef9b3078ff3a
-
SHA512
470774df7ed56dfa34a825b18b783faf3037ac1589d88249c9eae898af076f4922d344617283ba55e6c775b495a04a97ef47d800363c4e6b0422fb626e8bb197
-
SSDEEP
49152:vewwKO+qgqDVHAIWHcGwShj+wOBkGQL8UAWTUECi/dsv5d1TJU:AKOSqpXW8eSKZ3AqUQ/M5dzU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/2c4b9f1da660cc47a044ee56e82c9fcd7e2e37fce633db555679f3a225835009.exe
Files
-
4095099f8dc01fa0e768c90bc5f6930b.bin.zip
Password: infected
-
2c4b9f1da660cc47a044ee56e82c9fcd7e2e37fce633db555679f3a225835009.exe.exe windows:6 windows x86 arch:x86
Password: infected
2eabe9054cad5152567f0699947a2c5b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpy
Sections
Size: 685KB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
iwzvkqvn Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
oyimwesb Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE