Static task
static1
Behavioral task
behavioral1
Sample
d98f489de2f49702b0199b86513a20d1cfc96aeca08018fc37f4fa09c0414720.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d98f489de2f49702b0199b86513a20d1cfc96aeca08018fc37f4fa09c0414720.exe
Resource
win10v2004-20240426-en
General
-
Target
7559d7f4cc29f64d48f7c6a87d663e67.bin
-
Size
398KB
-
MD5
540a1627ba0016a8d55ce8dec8f0bb10
-
SHA1
c6e20e5763db83f0e82b261f6db65c798a95ad7f
-
SHA256
4c5541b7902597b11f8696ad136f808834103705b335edffec3db6503d61932a
-
SHA512
5dddd7e18d15719a9df993a96cc0b0b75d42a55fe3a3fba68b8ba570ac73166a0dde1c53d2eb9afef53eded742e4ce0f9536dfdb3f914f63f1f610c3df7e7175
-
SSDEEP
12288:Zrm5KIQtUooxZuV9WuavwuJMUDwilKbChqELw8JXn2:hCooM9Xa5MiKWgEcCXn2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/d98f489de2f49702b0199b86513a20d1cfc96aeca08018fc37f4fa09c0414720.exe
Files
-
7559d7f4cc29f64d48f7c6a87d663e67.bin.zip
Password: infected
-
d98f489de2f49702b0199b86513a20d1cfc96aeca08018fc37f4fa09c0414720.exe.exe windows:6 windows x86 arch:x86
Password: infected
81b834f6f9db0b945bd836f537996a1f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetClipBox
user32
PostQuitMessage
advapi32
CryptDecrypt
kernel32
HeapSize
CreateFileW
VirtualAlloc
WaitForSingleObject
GetModuleHandleA
FreeConsole
CreateThread
GetProcAddress
MultiByteToWideChar
GetStringTypeW
WideCharToMultiByte
GetCurrentThreadId
CloseHandle
WaitForSingleObjectEx
GetExitCodeThread
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
LCMapStringEx
ReleaseSRWLockExclusive
WakeAllConditionVariable
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetModuleHandleW
GetCPInfo
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetCurrentProcessId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetProcessHeap
RaiseException
RtlUnwind
GetLastError
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetCommandLineA
GetCommandLineW
HeapAlloc
HeapFree
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
ReadFile
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
HeapReAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
WriteConsoleW
Sections
.text Size: 121KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 309KB - Virtual size: 313KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ