Static task
static1
Behavioral task
behavioral1
Sample
A51B45A29E26454F8E09850CC9D3B97A.MAL_decrypted_mapped.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
A51B45A29E26454F8E09850CC9D3B97A.MAL_decrypted_mapped.exe
Resource
win10v2004-20240508-en
General
-
Target
A51B45A29E26454F8E09850CC9D3B97A.MAL_decrypted_mapped.7z
-
Size
58KB
-
MD5
a2f3f2d4c2aa041643bdae56daa39fef
-
SHA1
94835e5abf62fc238c7d5e675752e49d7bf044c3
-
SHA256
0f96fecd167f81a5589364703c04c82910c3b84dc0fa161d7c9426b476b5b7c1
-
SHA512
1de2785d6af344ffa0f7c39c7b13b057e84d0b2bccfcece3a830744344cace6b130f80c6bf6085d0051a90572ee02233d22b0925d043a254eb39fc5eeab9f7f6
-
SSDEEP
1536:OXQ47L6OjZwzevqQVcZYATjUBpma9hQDyu57uBpb:cmMXvqxTjImaf+yk8t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/A51B45A29E26454F8E09850CC9D3B97A.MAL_decrypted_mapped.exe
Files
-
A51B45A29E26454F8E09850CC9D3B97A.MAL_decrypted_mapped.7z.7z
Password: infected
-
A51B45A29E26454F8E09850CC9D3B97A.MAL_decrypted_mapped.exe.exe windows:6 windows x86 arch:x86
Password: infected
a47085e8acf72a5536a475c07003df65
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFileExistsW
api-ms-win-core-path-l1-1-0
PathCchRemoveFileSpec
kernel32
SetEvent
WaitForSingleObject
CreateEventW
GetExitCodeProcess
QueueUserWorkItem
GetModuleFileNameW
SetDefaultDllDirectories
GetLastError
UnregisterWait
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
HeapReAlloc
HeapSize
CloseHandle
OutputDebugStringW
DecodePointer
CreateFileW
RegisterWaitForSingleObject
TlsAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RaiseException
RtlUnwind
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
WriteConsoleW
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetStdHandle
WriteFile
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
HeapFree
HeapAlloc
GetFileType
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
GetStringTypeW
CompareStringW
LCMapStringW
GetProcessHeap
SetFilePointerEx
shell32
SHGetKnownFolderPath
ShellExecuteExW
ole32
CoTaskMemFree
advapi32
SetServiceStatus
RegisterServiceCtrlHandlerExW
ReportEventW
RegisterEventSourceW
DeregisterEventSource
StartServiceCtrlDispatcherW
Sections
.text Size: 79KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ