Static task
static1
Behavioral task
behavioral1
Sample
7b84f0641444a8e39e14f6a9f3f9363ee142acbe6fcb6dcd046d0ae2c463cf77.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7b84f0641444a8e39e14f6a9f3f9363ee142acbe6fcb6dcd046d0ae2c463cf77.exe
Resource
win10v2004-20240508-en
General
-
Target
24981658666a4f40f07f37bfb48d1372.bin
-
Size
10KB
-
MD5
7c696d6cc0e6137e263e02ab387d39c1
-
SHA1
0a420eccfc04db675b477cf4620577a39d32d296
-
SHA256
bd322126d7a1631d4aff456a3dbfa98820e055201d2118c24098f63a311c4d3b
-
SHA512
e82aeb54820748a132311386e91ca6b3d675add973b56613f9f94f82dd8cd47c595c29f0144bc7ae344dc178c3ce70288697050b200cf63fea0647620452513b
-
SSDEEP
192:tgWsZ9+sa5mpK8i+KSgasmfVGK3RoMoANogv+IxSFuyXVjDMHhQRrW:tHgEsa5mpTZIasmfVGq2MoAygWhFjgH3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/7b84f0641444a8e39e14f6a9f3f9363ee142acbe6fcb6dcd046d0ae2c463cf77.exe
Files
-
24981658666a4f40f07f37bfb48d1372.bin.zip
Password: infected
-
7b84f0641444a8e39e14f6a9f3f9363ee142acbe6fcb6dcd046d0ae2c463cf77.exe.exe windows:4 windows x86 arch:x86
Password: infected
b417d74ecba642ca8eceadf01d18afc0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MoveFileA
GetTempPathA
GetModuleFileNameA
lstrlenA
MoveFileExA
GlobalMemoryStatus
GetModuleHandleA
GetStartupInfoA
WaitForSingleObject
GetSystemInfo
CreateThread
CreateProcessA
GetFileAttributesA
GetLastError
LoadLibraryA
GetProcAddress
FreeLibrary
CreateFileA
WriteFile
CloseHandle
ExitThread
Sleep
GetCurrentProcessId
CopyFileA
GetTickCount
user32
MessageBoxA
wsprintfA
advapi32
CreateServiceA
ChangeServiceConfig2A
UnlockServiceDatabase
OpenServiceA
StartServiceA
RegSetValueExA
CloseServiceHandle
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
RegOpenKeyExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
OpenSCManagerA
LockServiceDatabase
ws2_32
select
__WSAFDIsSet
recv
WSAIoctl
send
WSAStartup
WSASocketA
WSAGetLastError
setsockopt
htonl
sendto
WSACleanup
gethostbyname
socket
htons
connect
closesocket
inet_addr
msvcrt
strlen
strcat
_controlfp
__set_app_type
strcpy
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_iob
malloc
free
rand
sprintf
memset
printf
fprintf
memcpy
_except_handler3
_local_unwind2
strstr
??3@YAXPAX@Z
strrchr
??2@YAPAXI@Z
strncmp
iphlpapi
GetIfTable
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE