Static task
static1
Behavioral task
behavioral1
Sample
bdec3bd3125ff915b433be0564f86717ba811f2b977c80e5f6ca3b671661396b.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
bdec3bd3125ff915b433be0564f86717ba811f2b977c80e5f6ca3b671661396b.exe
Resource
win10v2004-20240426-en
General
-
Target
15edacf005c10d72b08df66499091219.bin
-
Size
28KB
-
MD5
148418530b1b9a418e3a5b7f035d1036
-
SHA1
c6f4cc66c1c853432fc85baaf7d1f7c9c890a6f6
-
SHA256
5a253a8d666660bf53f6d4ee107fff6038d472f46a01287696bff6af7c96fd9f
-
SHA512
bd880cfa5a05599f91d18a58afe119d2dab6f5752249704b86bf797a818612d177ee9a244c2c97a6b3d3da925fd2b5e606fcea26e2442fbe015b346e701dd92a
-
SSDEEP
768:Ig4NShZMUUDzhg2vL5Im55gGBKhXI6HvWE3j:I51g6h5g3BI6HvHj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/bdec3bd3125ff915b433be0564f86717ba811f2b977c80e5f6ca3b671661396b.exe
Files
-
15edacf005c10d72b08df66499091219.bin.zip
Password: infected
-
bdec3bd3125ff915b433be0564f86717ba811f2b977c80e5f6ca3b671661396b.exe.exe windows:5 windows x86 arch:x86
Password: infected
318cc6baf22de5640b5a89a3bd3b774c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegSetValueExW
RegCloseKey
RegCreateKeyExW
kernel32
GetCommandLineA
HeapSetInformation
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetLastError
HeapFree
CloseHandle
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetProcAddress
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
Sleep
CreateFileA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
MultiByteToWideChar
LoadLibraryW
WriteConsoleW
SetFilePointer
IsProcessorFeaturePresent
HeapAlloc
HeapReAlloc
SetEndOfFile
GetProcessHeap
ReadFile
LCMapStringW
GetStringTypeW
HeapSize
CreateFileW
Sections
.text Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE