Static task
static1
Behavioral task
behavioral1
Sample
83acd84b3c19ab54641863d423b1bedd9e9de4b258ec2a6143666f78e02475c2.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
83acd84b3c19ab54641863d423b1bedd9e9de4b258ec2a6143666f78e02475c2.exe
Resource
win10v2004-20240426-en
General
-
Target
b7beb32277476ed209d3baf76c91abb2.bin
-
Size
326KB
-
MD5
1919568ce12f5a5b85f57380fb7e0bbc
-
SHA1
9c8bdacd1175d7e77993cbb98eff243a11b403f2
-
SHA256
9b20818b9b3f042d684ae99245791264cb31cf8496bc369231b31c9df44db655
-
SHA512
25579b72c2c8d00bb2a10ab1b3b482d22e38a3e60c9c25b7ad4abb87aaf7b7299743df704ab53887d8d36d97c673646ad461d76bd35a4101c86d016054a28040
-
SSDEEP
6144:OnE3XMWtUDrPHeAGNhWkOe/hoIGzxRF0qUbJ+0p1D4FbFd1zDvAamqCa3:OnQ9srPHI3W1CoIGFb0qCJXj0LjhMa3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/83acd84b3c19ab54641863d423b1bedd9e9de4b258ec2a6143666f78e02475c2.exe
Files
-
b7beb32277476ed209d3baf76c91abb2.bin.zip
Password: infected
-
83acd84b3c19ab54641863d423b1bedd9e9de4b258ec2a6143666f78e02475c2.exe.exe windows:4 windows x64 arch:x64
Password: infected
400af6120b659b2216a440ffa2baa3f4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CloseHandle
CreateSemaphoreW
DeleteCriticalSection
EnterCriticalSection
GetCurrentThreadId
GetLastError
GetModuleHandleW
GetProcAddress
GetStartupInfoW
InitializeCriticalSection
IsDBCSLeadByteEx
LeaveCriticalSection
LoadLibraryW
MultiByteToWideChar
RaiseException
ReleaseSemaphore
RtlCaptureContext
RtlLookupFunctionEntry
RtlUnwindEx
RtlVirtualUnwind
SetLastError
SetUnhandledExceptionFilter
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
msvcrt
__C_specific_handler
___lc_codepage_func
___mb_cur_max_func
__iob_func
__lconv_init
__set_app_type
__setusermatherr
__wgetmainargs
__winitenv
_amsg_exit
_cexit
_commode
_errno
_filelengthi64
_fileno
_fmode
_fstat64
_initterm
_lock
_lseeki64
_onexit
_strnicmp
_unlock
_vscprintf
_vsnprintf
_wcmdln
_wfopen
_wfopen_s
_wtoi
abort
calloc
exit
fclose
fflush
fgetpos
fopen
fprintf
fputc
fputs
fread
free
fseek
fsetpos
ftell
fwrite
getc
getwc
isspace
iswctype
localeconv
malloc
memchr
memcmp
memcpy
memmove
memset
putc
putwc
realloc
setlocale
setvbuf
signal
strcmp
strcoll
strcpy_s
strerror
strftime
strlen
strncmp
strxfrm
swprintf_s
system
towlower
towupper
ungetc
ungetwc
vfprintf
wcscmp
wcscoll
wcscpy_s
wcsftime
wcslen
wcsxfrm
_write
_read
_fileno
_fdopen
_close
Sections
.text Size: 752KB - Virtual size: 752KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 685KB - Virtual size: 684KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 8KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 104B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ