Static task
static1
Behavioral task
behavioral1
Sample
a2c996efff932151e3d97d6c0816cc4ad58e54068bc1b037ce2d279a55521008.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a2c996efff932151e3d97d6c0816cc4ad58e54068bc1b037ce2d279a55521008.exe
Resource
win10v2004-20240508-en
General
-
Target
240308-fm7zzagf7x_pw_infected.zip
-
Size
93KB
-
MD5
0a35e2e6f80f85c25b68836ceb25acd1
-
SHA1
715c9d44fa9f76d82348627199f36df195e213d0
-
SHA256
5873d883f5af9c1e0d3acb4db5bbc609ea6283156cf9429dd4077c44916b12fa
-
SHA512
db9f01997fe4ded70e6ac194171824e70e162d6d96d861c9549a7a0bc8ad6a187942f3a67aa7f57d3fe114a9940feb80475dec2f4c55b2f27c8cfbbddbaad2bf
-
SSDEEP
1536:q1wFdtMW1QNrEWzmBvEiwaxpWnKXy/HskVClIH3oU6e2Ky71Iuu1TQ2lR2Zc5e7p:q1uaAQOAmmyyKi/HssCIL27TyxRWc5Cp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/a2c996efff932151e3d97d6c0816cc4ad58e54068bc1b037ce2d279a55521008
Files
-
240308-fm7zzagf7x_pw_infected.zip.zip
Password: infected
-
a2c996efff932151e3d97d6c0816cc4ad58e54068bc1b037ce2d279a55521008.exe windows:5 windows x86 arch:x86
21c56590b26469b5e44c6820863a1cdf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleAliasExesLengthA
WriteConsoleOutputCharacterA
SystemTimeToTzSpecificLocalTime
GlobalAddAtomA
MoveFileExW
ZombifyActCtx
CreateJobObjectW
GetUserDefaultLCID
WideCharToMultiByte
LocalShrink
GetLocaleInfoW
FatalAppExitW
GetFileAttributesA
HeapCreate
GetModuleFileNameW
ReleaseSemaphore
ReplaceFileA
GetStdHandle
SetLastError
CreateNamedPipeA
BuildCommDCBW
LoadLibraryA
UnhandledExceptionFilter
InterlockedExchangeAdd
LocalAlloc
GetFileType
AddAtomW
lstrcatW
CancelTimerQueueTimer
VirtualProtect
GetCurrentDirectoryA
FileTimeToLocalFileTime
CreateFileW
SetStdHandle
HeapAlloc
GetCommandLineW
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
GetProcAddress
GetModuleHandleW
ExitProcess
WriteFile
EnterCriticalSection
LeaveCriticalSection
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
GetLastError
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LoadLibraryW
Sleep
HeapFree
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
IsProcessorFeaturePresent
HeapSize
HeapReAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LCMapStringW
MultiByteToWideChar
GetStringTypeW
SetFilePointer
CloseHandle
WriteConsoleW
user32
LoadIconA
GetClassLongW
SetKeyboardState
Sections
.text Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 26.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ