Static task
static1
Behavioral task
behavioral1
Sample
dbf6f9bca73a3177afd8a2aea09fadba98f9ff0b4515a6b7c209b60eb08b5e89.exe
Resource
win7-20240508-en
General
-
Target
32b5ed913683cab13590b9946c4568b7.bin
-
Size
223KB
-
MD5
bffae20a63347bdfa261636ad0ae7570
-
SHA1
358f69532fb4f2c9a0a3328e1c718e7031e717ad
-
SHA256
add0327099f896f62a1286d9e3a392a289e5d18f013853ed596f6ca2f6653baa
-
SHA512
eb9ba8ae573a3dc106d1074f14b3438e9ced62a732ad4a6c8d6421e5ce6cd3ad6ee854977a7109c70a05015ee3cd3106a9408dff7d586db3dc302b676f0c2adb
-
SSDEEP
3072:L4NlfowYT3gVmsjtbGVrrvDXAQX+Gg/q5UkiTlIO9sXHqW9uZ51T/3ityWJqsa2r:YvQ3gHbGVrHwQ+bCiTlF9DMukksaIKQV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/dbf6f9bca73a3177afd8a2aea09fadba98f9ff0b4515a6b7c209b60eb08b5e89.exe
Files
-
32b5ed913683cab13590b9946c4568b7.bin.zip
Password: infected
-
dbf6f9bca73a3177afd8a2aea09fadba98f9ff0b4515a6b7c209b60eb08b5e89.exe.exe windows:5 windows x86 arch:x86
Password: infected
7e361fa81ff2b1cca753ecc2ccf813e6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedIncrement
EnumCalendarInfoW
CreateJobObjectW
GetTimeFormatA
GetModuleHandleW
GetTickCount
EnumCalendarInfoExW
GetConsoleAliasesLengthA
FormatMessageA
GetSystemTimes
LoadLibraryW
SetVolumeMountPointA
WriteConsoleOutputA
FindNextVolumeW
GetConsoleAliasW
SetTimeZoneInformation
GetModuleFileNameW
SetConsoleTitleA
GetStringTypeA
GetStringTypeExA
GetConsoleAliasesW
SetLastError
GetThreadLocale
GetProcAddress
SetVolumeLabelW
VerLanguageNameW
BuildCommDCBW
LoadLibraryA
LocalAlloc
SetConsoleOutputCP
GetProcessAffinityMask
EnumDateFormatsW
CompareStringA
DeleteCriticalSection
DeleteAtom
OpenFileMappingA
LocalFileTimeToFileTime
RaiseException
GetComputerNameA
MultiByteToWideChar
GetLastError
HeapReAlloc
HeapAlloc
Sleep
ExitProcess
GetStartupInfoW
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
HeapFree
EnterCriticalSection
LeaveCriticalSection
HeapCreate
VirtualFree
VirtualAlloc
WriteFile
GetStdHandle
GetModuleFileNameA
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeW
GetLocaleInfoA
HeapSize
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
ReadFile
CreateFileA
CloseHandle
GetModuleHandleA
advapi32
RevertToSelf
Sections
.text Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 202KB - Virtual size: 201KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 23.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 94KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ