Static task
static1
Behavioral task
behavioral1
Sample
314c137a0bb73b688fb855ceb56f0ff129145ab7a573ecaed70dc4bb1c486f61.exe
Resource
win7-20240419-en
General
-
Target
052e6b664d68958cff0d19ef11286662.bin
-
Size
315KB
-
MD5
0e3d6f733dc3df11064fb1792db4dd5d
-
SHA1
b73e8708674790c0d106ea7aacca90aa4b43f9ea
-
SHA256
7371d21f531ec5c5ef2b392521f8abd4276a4f8161f4bd2a18969c5ce72cca4b
-
SHA512
af9cc611d3b96c085b8f19fb5c48f03c9ddd502e730f5a048786d5515b330dd2ef574caf75e702c66d308f4ac229b89b225925370794c0bf98e2d050b030537e
-
SSDEEP
6144:9BDjSBYYUC3T/fZSjZMaZQZ04sYIY+nfkv61ZIdug6axEsZTom3TW:7DjSBv7bYjZM2vwIDO61ZsJxZD36
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/314c137a0bb73b688fb855ceb56f0ff129145ab7a573ecaed70dc4bb1c486f61.exe
Files
-
052e6b664d68958cff0d19ef11286662.bin.zip
Password: infected
-
314c137a0bb73b688fb855ceb56f0ff129145ab7a573ecaed70dc4bb1c486f61.exe.exe windows:5 windows x86 arch:x86
Password: infected
aec527db97155c04ecadc13b1ffbed68
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleAliasesLengthW
GetNumaProcessorNode
GetLocaleInfoA
GetStringTypeA
GlobalAddAtomA
GetCommState
GetConsoleAliasA
InterlockedDecrement
SetDefaultCommConfigW
GetNamedPipeHandleStateA
GetTimeFormatA
GetModuleHandleW
GetTickCount
EnumCalendarInfoExW
GlobalAlloc
LoadLibraryW
SetVolumeMountPointA
FormatMessageW
WriteConsoleOutputA
lstrcpynW
LocalReAlloc
GetModuleFileNameW
RaiseException
CreateJobObjectA
GetConsoleAliasesW
GetLastError
GetThreadLocale
GetProcAddress
GetLongPathNameA
SetVolumeLabelW
BuildCommDCBW
LoadLibraryA
WriteConsoleA
RegisterWaitForSingleObject
SetCalendarInfoW
OpenJobObjectW
lstrcatW
GetConsoleTitleW
FindAtomW
FileTimeToLocalFileTime
OpenFileMappingA
EnumCalendarInfoExA
FindNextVolumeA
AreFileApisANSI
HeapAlloc
HeapReAlloc
GetStartupInfoW
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualFree
VirtualAlloc
HeapCreate
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
MultiByteToWideChar
GetConsoleOutputCP
WriteConsoleW
SetFilePointer
SetStdHandle
HeapSize
LCMapStringA
LCMapStringW
GetStringTypeW
ReadFile
CreateFileA
CloseHandle
GetModuleHandleA
user32
LoadIconA
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 34.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 111KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ