Static task
static1
Behavioral task
behavioral1
Sample
1e7223bc42e7aa07035b6deb1c3cedd2cba26b522227548061b5723bf744ae3c.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1e7223bc42e7aa07035b6deb1c3cedd2cba26b522227548061b5723bf744ae3c.exe
Resource
win10v2004-20240508-en
General
-
Target
53099afa75043ea832b64db81231caff.bin
-
Size
1.1MB
-
MD5
b201afc9c7e951a0ae16c40bd7d512b2
-
SHA1
82f59f86c008bf1755a597620b21dbb294eaf606
-
SHA256
bcc440964aff2c94d3721bf527969d40f3f32043bb110d36d507750a445c7165
-
SHA512
d26f4c2566096317f0e94d4d2136b4195e52a755c33d99c48a3b622410bd5b1531b80ffad740b9c40cedd531e18304baa518d9f720c4d63bd3079278a8e9f259
-
SSDEEP
24576:H98rTcm3qit/gRnk3bwWr48W6SJIdioXltUPIS4vH4N:H9O7O+bwWE8QJIQslsd4P4N
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/1e7223bc42e7aa07035b6deb1c3cedd2cba26b522227548061b5723bf744ae3c.exe
Files
-
53099afa75043ea832b64db81231caff.bin.zip
Password: infected
-
1e7223bc42e7aa07035b6deb1c3cedd2cba26b522227548061b5723bf744ae3c.exe.exe windows:6 windows x64 arch:x64
Password: infected
962c85077451500f48e28c629171faa0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
CreateFileW
SetFilePointerEx
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
HeapReAlloc
HeapSize
GetProcessHeap
LCMapStringW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
CloseHandle
GetStringTypeW
GetFileType
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapFree
HeapAlloc
GetModuleHandleExW
TerminateProcess
WriteConsoleW
HeapCreate
LoadLibraryA
GetProcAddress
GetModuleHandleA
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
RtlUnwindEx
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
EncodePointer
RaiseException
RtlPcToFileHeader
GetStdHandle
WriteFile
GetModuleFileNameW
GetCurrentProcess
ExitProcess
user32
ToUnicodeEx
SetWindowPlacement
IsDlgButtonChecked
GetDialogBaseUnits
GetClipboardData
CharToOemW
CharNextW
GetFocus
GetKeyNameTextW
GetCapture
KillTimer
AppendMenuW
GetMenuInfo
SetMenuInfo
DrawIcon
GetWindowDC
ExcludeUpdateRgn
InvalidateRect
EnumDisplayDevicesW
ChangeDisplaySettingsExW
CopyIcon
PrivateExtractIconsW
GetParent
GetDesktopWindow
GetClassLongW
CopyRect
HideCaret
DestroyCaret
EnumPropsW
winspool.drv
EnumJobsW
GetPrinterW
GetPrinterDataW
GetPrinterDataExW
EnumPrinterDataW
EnumPrinterDataExW
GetJobW
SetPrinterDataExW
GetFormW
EnumFormsW
ConfigurePortW
SetPortW
ResetPrinterW
SetJobW
SetPrinterDataW
version
GetFileVersionInfoW
VerQueryValueW
comctl32
ord412
ord15
ord13
PropertySheetW
ord413
Sections
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 241KB - Virtual size: 241KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 207KB - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ