Static task
static1
Behavioral task
behavioral1
Sample
cfa0a176bad0046bd498a5a7f5140ca92734b096c541a54acd1b002f228ec47c.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
cfa0a176bad0046bd498a5a7f5140ca92734b096c541a54acd1b002f228ec47c.exe
Resource
win10v2004-20240611-en
General
-
Target
b2d33941295f236bebee0d3c389a8549.bin
-
Size
2.1MB
-
MD5
b5ea75722aee3da1885bf52de6ca982d
-
SHA1
b2a06a1960e14e2b4ee420d285bdf40f5c087408
-
SHA256
5434dabf87c87088918c1808f6c37149b47fc8b39f368a625a44fd9ee3cca16c
-
SHA512
6156ff3bbd0cf2a86a9b318eddae458c67469bb464553af806c261f59b4dd4f79a2c5a5fc41e0f0f58110d9944f5ab65bb4d666be74a547c9517bcc59c302a36
-
SSDEEP
49152:L13kwdsg/ePoDYv55e1YMhUE5/+bhAnwpk0ngGPMhRIUEZjkHLJT:L13kQdYP+hhUnG30gYyRuJkrJT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/cfa0a176bad0046bd498a5a7f5140ca92734b096c541a54acd1b002f228ec47c.exe
Files
-
b2d33941295f236bebee0d3c389a8549.bin.zip
Password: infected
-
cfa0a176bad0046bd498a5a7f5140ca92734b096c541a54acd1b002f228ec47c.exe.exe windows:6 windows x86 arch:x86
Password: infected
cbe5fc5e7bee4b0be15ed00994864f05
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
CreateFileA
CloseHandle
GetCommandLineA
ConvertThreadToFiber
CreateFiber
SwitchToFiber
OpenThread
GetCurrentProcessId
GetTempPathA
WaitForSingleObject
GetFileSize
OpenFileMappingA
CreateNamedPipeA
CallNamedPipeA
ExitProcess
VirtualAlloc
GetNamedPipeHandleStateA
HeapLock
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetStringTypeW
GetLastError
SetLastError
MultiByteToWideChar
GetACP
EncodePointer
DecodePointer
HeapAlloc
HeapFree
GetModuleHandleW
GetProcAddress
InitializeCriticalSectionAndSpinCount
TlsGetValue
TlsSetValue
FreeLibrary
LoadLibraryExW
LCMapStringW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
IsValidCodePage
GetOEMCP
GetCPInfo
GetModuleHandleExW
WideCharToMultiByte
RaiseException
RtlUnwind
SetStdHandle
WriteFile
GetConsoleCP
GetConsoleMode
SetFilePointerEx
FlushFileBuffers
WriteConsoleW
CreateFileW
Sections
.text Size: 118KB - Virtual size: 118KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 992KB - Virtual size: 991KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2.7MB - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 68B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ