Static task
static1
Behavioral task
behavioral1
Sample
46ed2e58e5b02d6e62b6863e30659fe01aae9174023628a08bb977c08a3f1087.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
46ed2e58e5b02d6e62b6863e30659fe01aae9174023628a08bb977c08a3f1087.exe
Resource
win10v2004-20240508-en
General
-
Target
5900dba92dda0c5c57825b576e1650fc.bin
-
Size
408KB
-
MD5
e4013bb4faca61d81ef9d45666a10b9b
-
SHA1
83a4f9bfb3935eeacbde02259a64da8fa473b02d
-
SHA256
1a84c18ecef15410a18b545902667c38ef5c38316143ff61fe6433f023d50377
-
SHA512
93be1b427cc5dd15618e061cad84868e3f3fa9f76c7e20457a4d602a48f357b1937f1be24831d204ad0b7b24878ed8cb55aa920a783a7df30f957775a4be1d72
-
SSDEEP
6144:r/jCfUHD5nm+81MCGegQtK674Tx9QBjCjEU5cbDodUQhdfxMuYKGLXkHDna:r/jIUw+8rc60yBWjpmDeUc7MuiQHDa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/46ed2e58e5b02d6e62b6863e30659fe01aae9174023628a08bb977c08a3f1087.exe
Files
-
5900dba92dda0c5c57825b576e1650fc.bin.zip
Password: infected
-
46ed2e58e5b02d6e62b6863e30659fe01aae9174023628a08bb977c08a3f1087.exe.exe windows:6 windows x86 arch:x86
Password: infected
0a4c7d040d509e9acd7bca5fe36b30e0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
TerminateProcess
FindClose
WaitForSingleObject
ResumeThread
OpenProcess
GetLastError
GetFileAttributesA
LoadLibraryA
WriteProcessMemory
GetThreadContext
WriteConsoleW
GetProcAddress
VirtualAllocEx
ReadProcessMemory
GetModuleHandleW
FreeLibrary
CreateProcessA
SetThreadContext
GetComputerNameA
GetExitCodeProcess
HeapSize
CloseHandle
FindFirstFileW
GetProcessHeap
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
MultiByteToWideChar
GetStringTypeW
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
LCMapStringEx
GetCPInfo
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
RtlUnwind
RaiseException
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetStdHandle
WriteFile
GetModuleFileNameW
HeapAlloc
HeapFree
GetFileType
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
ReadFile
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
HeapReAlloc
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
CreateFileW
advapi32
GetUserNameA
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ