Static task
static1
Behavioral task
behavioral1
Sample
b90b3d714a5efb0d5eb22772ab60d14283402719fc6c635c2e8a6ecf724197c5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b90b3d714a5efb0d5eb22772ab60d14283402719fc6c635c2e8a6ecf724197c5.exe
Resource
win10v2004-20240426-en
General
-
Target
af829f8d37a62d8ea98152583c4d89d0.bin
-
Size
770KB
-
MD5
11f90ae69e6c6176933b93f8326e2ed3
-
SHA1
f4143174f09068c7501b570d21bd74cace315be8
-
SHA256
fc5d30cd489411803678d47da0190cc881842732bf4277f5994f8e1b939c66da
-
SHA512
3c84425d49f83d966c96ef6f481553f0930abef069e97ac7a0f59b19068963b4e119ec507ef51474cee5e84c9b346562e16f502d0a9a4b07e5eba2c39cf44cb2
-
SSDEEP
12288:kPldd+Ur7ppkakhgDWVk4Dhwj0QljoYWRxj6EUVZHWtdYOGCh:qrsakh0weoQlj4jBUVZHEp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/b90b3d714a5efb0d5eb22772ab60d14283402719fc6c635c2e8a6ecf724197c5.exe
Files
-
af829f8d37a62d8ea98152583c4d89d0.bin.zip
Password: infected
-
b90b3d714a5efb0d5eb22772ab60d14283402719fc6c635c2e8a6ecf724197c5.exe.exe windows:6 windows x64 arch:x64
Password: infected
0c5d55e320aac8d2003648d6d01af0c3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
bcryptprimitives
ProcessPrng
kernel32
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentThreadId
EncodePointer
SetLastError
RaiseException
GetQueuedCompletionStatusEx
DeleteCriticalSection
GetFinalPathNameByHandleW
GetCurrentThread
LocalFree
GetStdHandle
GetConsoleMode
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
WriteConsoleW
QueryPerformanceFrequency
GetModuleHandleW
FormatMessageW
GetEnvironmentVariableW
GetModuleFileNameW
GetFullPathNameW
CreateDirectoryW
CreateFileW
GetFileInformationByHandle
GetFileInformationByHandleEx
SetThreadStackGuarantee
AddVectoredExceptionHandler
EnumSystemLocalesA
IsProcessorFeaturePresent
QueryPerformanceCounter
GetProcessHeap
GetCurrentDirectoryW
RtlCaptureContext
RtlLookupFunctionEntry
WaitForSingleObjectEx
LoadLibraryA
GetCurrentProcessId
CreateMutexA
ReleaseMutex
RtlVirtualUnwind
HeapAlloc
CopyFileExW
SetHandleInformation
RtlUnwindEx
HeapCreate
FlushInstructionCache
GetSystemInfo
WriteProcessMemory
GetProcAddress
FreeLibrary
GetModuleHandleA
GetCurrentProcess
PostQueuedCompletionStatus
TlsAlloc
GetSystemTimeAsFileTime
TlsGetValue
TlsSetValue
FindClose
FindNextFileW
FindFirstFileW
TlsFree
lstrlenW
GetLastError
LoadLibraryExW
RtlPcToFileHeader
Sleep
WaitForSingleObject
SetWaitableTimer
CreateWaitableTimerExW
SetEnvironmentVariableW
GetSystemTimePreciseAsFileTime
HeapReAlloc
CloseHandle
CreateThread
SetFileCompletionNotificationModes
SwitchToThread
HeapFree
TerminateProcess
CreateIoCompletionPort
api-ms-win-core-synch-l1-2-0
WakeByAddressSingle
WaitOnAddress
WakeByAddressAll
bcrypt
BCryptGenRandom
advapi32
RegCloseKey
RegQueryValueExW
SystemFunction036
RegOpenKeyExW
crypt32
CertDuplicateStore
CertCloseStore
CertDuplicateCertificateContext
CertOpenStore
CertFreeCertificateContext
CertAddCertificateContextToStore
CertVerifyCertificateChainPolicy
CertFreeCertificateChain
CertDuplicateCertificateChain
CertGetCertificateChain
CertEnumCertificatesInStore
shell32
SHGetKnownFolderPath
ole32
CoInitializeEx
CoCreateInstance
CoTaskMemFree
oleaut32
SysAllocStringLen
SysStringLen
SysFreeString
GetErrorInfo
ws2_32
ioctlsocket
setsockopt
WSAIoctl
bind
closesocket
connect
getsockopt
WSASocketW
freeaddrinfo
WSACleanup
getsockname
WSAGetLastError
getpeername
recv
send
WSASend
getaddrinfo
shutdown
WSAStartup
ntdll
NtCancelIoFileEx
NtDeviceIoControlFile
NtCreateFile
NtWriteFile
RtlNtStatusToDosError
secur32
AcquireCredentialsHandleA
ApplyControlToken
FreeContextBuffer
DeleteSecurityContext
FreeCredentialsHandle
EncryptMessage
QueryContextAttributesW
AcceptSecurityContext
DecryptMessage
InitializeSecurityContextW
api-ms-win-crt-math-l1-1-0
__setusermatherr
pow
api-ms-win-crt-runtime-l1-1-0
_seh_filter_exe
_set_app_type
_initterm
_register_onexit_function
_crt_atexit
_configure_narrow_argv
exit
terminate
_exit
abort
_register_thread_local_exe_atexit_callback
__p___argc
__p___argv
_c_exit
_initialize_narrow_environment
_cexit
_initterm_e
_get_initial_narrow_environment
_initialize_onexit_table
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__p__commode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-heap-l1-1-0
free
malloc
calloc
_set_new_mode
api-ms-win-crt-string-l1-1-0
strcpy_s
wcsncmp
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 446KB - Virtual size: 446KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 99KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ