Static task
static1
Behavioral task
behavioral1
Sample
9fac4bf8a43369d1960401c239e7e04c63613a7209f0b08f39fbd3262d0e555d.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9fac4bf8a43369d1960401c239e7e04c63613a7209f0b08f39fbd3262d0e555d.exe
Resource
win10v2004-20240508-en
General
-
Target
bcc6522e6cd09522a15bd196f39ae6fa.bin
-
Size
962KB
-
MD5
3b53bcad9b16045c54c3c0e6f35679dd
-
SHA1
73e5e8f45644dd0dbf471063a901c596c9347774
-
SHA256
652684ad469acc5c348492aed36a86597480d7bd4d137837b639ed3aff43865b
-
SHA512
7f4c834587a51b3d6fc019fe67b687ad8644384b9d733e036f8e8263ad42e1786d6b642f2c821272e5268d8208621953d100a897b6094d5ad04e0b2fdee31878
-
SSDEEP
12288:/fvoqb101eiVZZcnyl2vdPT+xVSLfWCUfqHNiTUAXWXv4tzBZ4dCdNmTDgMde8CQ:Hv7b61PcmcTXdTNaUc/ZEGmTcmoMgs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/9fac4bf8a43369d1960401c239e7e04c63613a7209f0b08f39fbd3262d0e555d.exe
Files
-
bcc6522e6cd09522a15bd196f39ae6fa.bin.zip
Password: infected
-
9fac4bf8a43369d1960401c239e7e04c63613a7209f0b08f39fbd3262d0e555d.exe.exe windows:6 windows x86 arch:x86
Password: infected
b0c9db535d52c5298922aca6c11bb724
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObject
ResumeThread
GetModuleHandleA
OpenProcess
GetFileAttributesA
LoadLibraryA
CloseHandle
LoadLibraryW
CreateThread
GetThreadContext
WriteConsoleW
GetProcAddress
VirtualAllocEx
ReadProcessMemory
GetModuleHandleW
FreeLibrary
CreateProcessA
FindClose
GetComputerNameA
GetExitCodeProcess
HeapSize
SetFilePointerEx
GetFileSizeEx
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
GetProcessHeap
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
TerminateProcess
VirtualAlloc
WriteProcessMemory
VirtualProtect
SetThreadContext
FindFirstFileW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
WideCharToMultiByte
GetStringTypeW
GetCPInfo
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetCurrentProcess
RtlUnwind
RaiseException
GetLastError
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
HeapAlloc
HeapFree
LCMapStringW
GetFileType
HeapReAlloc
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
CreateFileW
user32
DefWindowProcW
MessageBoxW
CreateWindowExW
RegisterClassExW
ShowWindow
DispatchMessageW
GetMessageW
LoadIconW
LoadCursorW
PostQuitMessage
UpdateWindow
BeginPaint
EndPaint
TranslateMessage
gdi32
TextOutW
SetTextColor
Polyline
advapi32
GetUserNameA
Sections
.text Size: 4.5MB - Virtual size: 4.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ