Static task
static1
Behavioral task
behavioral1
Sample
e494594a9533517d5ab77d778f1bdaf917d805cebc1abfd79732f5cacddd2aff.exe
Resource
win7-20240215-en
General
-
Target
6c8fada910ae5f7fd06e1de5a5da9988.bin
-
Size
314KB
-
MD5
ecbd6f2c65524d94dff79c6abd539e01
-
SHA1
6984e851a18bd969660174c26fd06688bc3ac351
-
SHA256
84102395dd59fd7845ff3f66f554d42cfd6f0f38e1bfe1d501dd5dd8dad55dc2
-
SHA512
e35d0d47a8e7df9ec7e2586f07e08e555b670182e9adbfb03b41d05319ea1f208e717254408efbbdc32346a4909f3b375869d14bfac0762e9f4b43363875f5d2
-
SSDEEP
6144:6FCzaeQQRusK8lV5PYEoO/yFmKLIsPuj81T7oS+rboyQ7Z5C:4CRPKo/YEoO/yFmKEsP681PflV5C
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/e494594a9533517d5ab77d778f1bdaf917d805cebc1abfd79732f5cacddd2aff.exe
Files
-
6c8fada910ae5f7fd06e1de5a5da9988.bin.zip
Password: infected
-
e494594a9533517d5ab77d778f1bdaf917d805cebc1abfd79732f5cacddd2aff.exe.exe windows:5 windows x86 arch:x86
Password: infected
1f5bc5eaef7b7ceb4b3c6a5fae4fd983
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedIncrement
EnumCalendarInfoW
CreateJobObjectW
GetTimeFormatA
GetModuleHandleW
GetTickCount
EnumCalendarInfoExW
GetConsoleAliasesLengthA
FormatMessageA
GetSystemTimes
LoadLibraryW
SetVolumeMountPointA
WriteConsoleOutputA
FindNextVolumeW
GetConsoleAliasW
GetModuleFileNameW
SetConsoleTitleA
GetStringTypeExA
GetStringTypeA
SetLastError
GetThreadLocale
GetProcAddress
SetVolumeLabelW
VerLanguageNameW
BuildCommDCBW
LoadLibraryA
LocalAlloc
SetConsoleOutputCP
GetProcessAffinityMask
FreeEnvironmentStringsW
EnumDateFormatsW
CompareStringA
DeleteCriticalSection
DeleteAtom
OpenFileMappingA
LocalFileTimeToFileTime
GetConsoleAliasesW
GetComputerNameA
MultiByteToWideChar
GetLastError
HeapReAlloc
HeapAlloc
Sleep
ExitProcess
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapCreate
VirtualFree
VirtualAlloc
WriteFile
GetStdHandle
GetModuleFileNameA
InitializeCriticalSectionAndSpinCount
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeW
GetLocaleInfoA
RtlUnwind
HeapSize
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
ReadFile
CreateFileA
CloseHandle
GetModuleHandleA
advapi32
RevertToSelf
Sections
.text Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 291KB - Virtual size: 291KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 23.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 94KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ