Static task
static1
Behavioral task
behavioral1
Sample
950eee474cf4cb3b59178b348cfd618460dc7a895b6a024aa7b3c07845b5c6ab.exe
Resource
win7-20240221-en
General
-
Target
7ca21eefff568606fed91321aaa31ba2.bin
-
Size
90KB
-
MD5
e663c0015b69ce0279c9221d074dc5b4
-
SHA1
b62062c652521afd5902047dd0acaab1aa4a81a8
-
SHA256
d4fc4c960d724c173bb246133761bbd7ff3806475da388b47ea8f584ebfbcb6e
-
SHA512
38d05efdd63f7c64afbe850d34f730984705d17cc0d8c69ff22d989e6c6931a4d35a0c4ce6d0f47b00fce6540a2600a8b97c1b1b70cca5b265a2b3dd604b6cb0
-
SSDEEP
1536:5sJ3xtnhWtOcCfK+KAKidzENA47Fi7miDAXMuRWdXGlwyG1WF9jKT8Yqk7U25fB0:5sJ3vnhWthS7KjWzW4mOAcu2XGK5YA8Z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/950eee474cf4cb3b59178b348cfd618460dc7a895b6a024aa7b3c07845b5c6ab.exe
Files
-
7ca21eefff568606fed91321aaa31ba2.bin.zip
Password: infected
-
950eee474cf4cb3b59178b348cfd618460dc7a895b6a024aa7b3c07845b5c6ab.exe.exe windows:6 windows x86 arch:x86
Password: infected
66deda4204cb009d8c01c3f28c17567f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualFree
GetCurrentProcess
VirtualAlloc
TerminateProcess
GetModuleHandleA
GetLastError
GetProcAddress
ExitProcess
VirtualProtect
BuildCommDCBAndTimeoutsA
WriteConsoleW
CloseHandle
CreateFileW
SetFilePointerEx
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
HeapReAlloc
HeapSize
GetModuleHandleW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
RaiseException
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetStdHandle
WriteFile
GetModuleFileNameW
GetModuleHandleExW
HeapFree
HeapAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetFileType
GetStringTypeW
LCMapStringW
GetProcessHeap
DecodePointer
gdi32
LPtoDP
Sections
.text Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ