Static task
static1
Behavioral task
behavioral1
Sample
410845b99861fdc39fbe003a3cd469fb4e4cec2f50b59c7697d4834b7fb9c4d8.exe
Resource
win7-20240215-en
General
-
Target
14ac2261851778d8dbba62e6b074aacc.bin
-
Size
324KB
-
MD5
5e1f74ce8e3b2ed85a17b0eb94ca6544
-
SHA1
fef66787a2922fbec6aaf2d78a23d8b6257ebb2e
-
SHA256
6411797d3753ab959e71005551ae2db76236a3d8f4b5d3c0418da5d12e47db64
-
SHA512
4d5cc578d17a2c69f77626a08bb4afe47ac757e4d2623826de84d44055e0995cb0480082da517f7b686868440da5bd6696ed6cebca201caf521dd3ec8b53f62c
-
SSDEEP
6144:cv5qx7BdeinOlxU+NJxSQAY5nbP7hs56vWz/xkDVAwxpF7nfUKO6wN:lFQi2G+NJxAWb1s5xSpDzNM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/410845b99861fdc39fbe003a3cd469fb4e4cec2f50b59c7697d4834b7fb9c4d8.exe
Files
-
14ac2261851778d8dbba62e6b074aacc.bin.zip
Password: infected
-
410845b99861fdc39fbe003a3cd469fb4e4cec2f50b59c7697d4834b7fb9c4d8.exe.exe windows:6 windows x86 arch:x86
Password: infected
88e34d90601d2e0d6ee3ae42f542316d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObjectEx
CreateThread
VirtualAlloc
FreeConsole
RaiseException
InitOnceBeginInitialize
InitOnceComplete
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryAcquireSRWLockExclusive
GetCurrentThreadId
WakeAllConditionVariable
SleepConditionVariableSRW
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
GetLastError
FreeLibraryWhenCallbackReturns
CreateThreadpoolWork
SubmitThreadpoolWork
CloseThreadpoolWork
GetModuleHandleExW
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
QueryPerformanceCounter
CloseHandle
EncodePointer
DecodePointer
LCMapStringEx
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
GetCPInfo
GetCurrentProcessId
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetCurrentProcess
TerminateProcess
CreateFileW
RtlUnwind
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetCommandLineA
GetCommandLineW
HeapFree
HeapAlloc
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
GetFileSizeEx
SetFilePointerEx
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
ReadFile
ReadConsoleW
HeapReAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
GetProcessHeap
HeapSize
WriteConsoleW
Sections
.text Size: 150KB - Virtual size: 150KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.TON Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 215KB - Virtual size: 219KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ