Static task
static1
Behavioral task
behavioral1
Sample
f9d73abb0c34be6697cfb2178e7ab4d3737b749b632dd3f910f83b4c74d1cc7e.exe
Resource
win7-20240215-en
General
-
Target
4d6f72d6ebd0036be02ef6103bba5328.bin
-
Size
917KB
-
MD5
62d39461db3edb4f96ff30bf4d60e8c4
-
SHA1
ba76c6fd526845d7f280ee4ba9e16a6d1475337c
-
SHA256
e3fed88eaec83100f0c2c6237d0e5d7bdde561e0c6c616e4d48470fe69fcab26
-
SHA512
106fcd6e9c9a1a64d81b50afa5882ad298482ca8b262fe91fd787113cba04efcdce0cf7e000b354002d5372ad0f3bc7d2308038b863712428309df790c1bdbab
-
SSDEEP
24576:pIsZJ8UkDi5oMS+g44ByY2PlPpHDYBIim5iE:dWNDi5oT9BZelBHDSMiE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/f9d73abb0c34be6697cfb2178e7ab4d3737b749b632dd3f910f83b4c74d1cc7e.exe
Files
-
4d6f72d6ebd0036be02ef6103bba5328.bin.zip
Password: infected
-
f9d73abb0c34be6697cfb2178e7ab4d3737b749b632dd3f910f83b4c74d1cc7e.exe.exe windows:6 windows x64 arch:x64
Password: infected
542082e8f3f2150ee452372c3780ddc3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
user32
GetForegroundWindow
MessageBeep
ShowCursor
MessageBoxA
ReleaseDC
GetClientRect
wvsprintfA
GetDC
GetDesktopWindow
GetWindowThreadProcessId
SetDlgItemTextA
LoadAcceleratorsA
SetDlgItemInt
TrackPopupMenu
GetDlgItem
LoadCursorA
DialogBoxParamA
FindWindowA
GetSystemMetrics
UnregisterClassA
gdi32
GetFontUnicodeRanges
MaskBlt
SetPixel
kernel32
GetCurrentThreadId
QueryPerformanceCounter
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetSystemTimeAsFileTime
ResumeThread
CreateRemoteThread
VirtualProtectEx
VirtualAlloc
GetNativeSystemInfo
VirtualProtect
TerminateProcess
Beep
InitializeSListHead
GetStartupInfoW
VirtualFree
WaitForSingleObject
GetComputerNameA
GetLogicalProcessorInformation
GetModuleFileNameA
CreateFileA
GetFileSize
ReadFile
CloseHandle
GlobalMemoryStatusEx
GetConsoleWindow
GetCurrentProcess
SetPriorityClass
GetSystemInfo
GetLocalTime
GetVersion
Sleep
GetTickCount64
CreateFileW
DeviceIoControl
LoadLibraryA
GetProcAddress
GetTickCount
FreeLibrary
GetSystemTime
GetTempPathA
IsDebuggerPresent
GetWindowsDirectoryA
GetCurrentProcessId
OpenProcess
VirtualAllocEx
WriteProcessMemory
VirtualFreeEx
GetComputerNameExA
GetModuleHandleW
vcruntime140
memcpy
memset
strstr
__C_specific_handler
__std_exception_copy
__std_exception_destroy
_CxxThrowException
__current_exception
__current_exception_context
api-ms-win-crt-string-l1-1-0
strcat
strcmp
strcat_s
api-ms-win-crt-utility-l1-1-0
rand
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__acrt_iob_func
__p__commode
__stdio_common_vfprintf
api-ms-win-crt-heap-l1-1-0
free
_set_new_mode
malloc
_callnewh
api-ms-win-crt-runtime-l1-1-0
_set_app_type
_configure_narrow_argv
_initialize_narrow_environment
_get_narrow_winmain_command_line
_seh_filter_exe
_initterm
_initterm_e
exit
_exit
_crt_atexit
_cexit
_c_exit
_register_thread_local_exe_atexit_callback
_register_onexit_function
_initialize_onexit_table
terminate
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 429KB - Virtual size: 429KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 659KB - Virtual size: 663KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 720B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 166KB - Virtual size: 166KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ