Static task
static1
Behavioral task
behavioral1
Sample
9ec622d7da8fda359a4e6a7c5d9d8b6c1a48abfa554df66caac8824018ca8e9f.exe
Resource
win7-20240221-en
General
-
Target
27a4677e416fcf06b07cde5fdf27ffc7a341772fea2e747c8b498ed5389eac89
-
Size
273KB
-
MD5
f20c9a4f5b597cb3a068fe308816d175
-
SHA1
74bc24fd8eb5455cb328dacbc60ad9ae79a515de
-
SHA256
27a4677e416fcf06b07cde5fdf27ffc7a341772fea2e747c8b498ed5389eac89
-
SHA512
2a6caa542d8d9379a687d04f675fa5a2a13b4619e5be368fefcc3c19ab20821aede96534828688b481390722e4283b331b0aff6f52d5d013e42e9ed50baeb404
-
SSDEEP
6144:06vwLabSycpgywmET8dEh+DNunLVtN4FSbWF1OG0aGtw3STF7:06YLmSWm68GMDN9SqFMGV6wCt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/9ec622d7da8fda359a4e6a7c5d9d8b6c1a48abfa554df66caac8824018ca8e9f.exe
Files
-
27a4677e416fcf06b07cde5fdf27ffc7a341772fea2e747c8b498ed5389eac89.zip
Password: infected
-
9ec622d7da8fda359a4e6a7c5d9d8b6c1a48abfa554df66caac8824018ca8e9f.exe.exe windows:5 windows x86 arch:x86
f60d9bb04c40f0b0957242fb52e0df53
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LocalAlloc
GetLastError
SetLastError
ReadProcessMemory
_lopen
OpenEventA
LoadLibraryW
LoadLibraryExW
GetModuleFileNameW
GetModuleHandleA
GetSystemDirectoryW
CreateDirectoryW
SetFileAttributesW
GetVolumeInformationW
IsBadStringPtrW
BuildCommDCBA
SetComputerNameA
SetInformationJobObject
FindNextVolumeA
FindNextVolumeMountPointW
GetOEMCP
GetCalendarInfoA
GetNumberFormatA
GetStringTypeA
SetConsoleCursorInfo
SetConsoleWindowInfo
AddConsoleAliasW
ReadFile
SetEndOfFile
WriteConsoleW
SetFilePointerEx
EncodePointer
DecodePointer
HeapFree
RaiseException
RtlUnwind
GetCommandLineA
IsProcessorFeaturePresent
HeapAlloc
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
HeapSize
GetProcessHeap
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameA
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
LCMapStringW
IsValidCodePage
GetACP
GetCPInfo
HeapReAlloc
OutputDebugStringW
GetStringTypeW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
CreateFileW
CloseHandle
SetStdHandle
ReadConsoleW
user32
GetSysColorBrush
GetMenu
DdeKeepStringHandle
Sections
.text Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 189KB - Virtual size: 36.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 98KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ