Static task
static1
Behavioral task
behavioral1
Sample
92de114d2acbd9847a20b422c154d6d829a2f17cb904af120daba9af1c219c6b.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
92de114d2acbd9847a20b422c154d6d829a2f17cb904af120daba9af1c219c6b.exe
Resource
win10v2004-20240226-en
General
-
Target
08c8d3dd85fe54c8216bd995b83d0a0f.bin
-
Size
57KB
-
MD5
d6f4ba20320c69751bfeeef16b84729e
-
SHA1
b0509fb68e66d8eb1626538338061c1475fb25f4
-
SHA256
2785033b0fc3c16879c33303fc85bb4158b0669d77c3618213c9d46caf05b6c5
-
SHA512
397295e4e9fd04e9a4a81f4cf708b15fa1efe0673cd705659bb666b07fdb98fb26220dbf0630cdf415d23cc09b2eb43d0565453e5607cd035ed1c11bbc03a7fe
-
SSDEEP
1536:8kKOeCY235G66AAdmm7/hsSr+qoGWsEm2oHMa:nY23szzVLKqoGWsz3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/92de114d2acbd9847a20b422c154d6d829a2f17cb904af120daba9af1c219c6b.exe
Files
-
08c8d3dd85fe54c8216bd995b83d0a0f.bin.zip
Password: infected
-
92de114d2acbd9847a20b422c154d6d829a2f17cb904af120daba9af1c219c6b.exe.exe windows:5 windows x86 arch:x86
Password: infected
b8bf08fa843a9ec1ce10d80fbf550c26
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSectionAndSpinCount
HeapDestroy
LeaveCriticalSection
HeapCreate
EnterCriticalSection
DeleteCriticalSection
WaitForSingleObject
SetEvent
Sleep
CreateEventA
GetLastError
CloseHandle
GetCurrentThreadId
SwitchToThread
SetLastError
WideCharToMultiByte
lstrlenW
InterlockedExchange
ResetEvent
CreateEventW
CancelIo
TryEnterCriticalSection
SetWaitableTimer
CreateWaitableTimerW
GetThreadContext
InterlockedCompareExchange
OpenProcess
GetFileAttributesA
GetExitCodeProcess
CreateProcessA
GetSystemDirectoryA
VirtualAllocEx
WriteProcessMemory
ResumeThread
FreeLibrary
SetUnhandledExceptionFilter
GetCurrentProcess
LoadLibraryW
GetConsoleWindow
CreateFileW
GetProcAddress
GetLocalTime
IsDebuggerPresent
GetCurrentProcessId
CreateThread
LCMapStringW
WriteConsoleW
SetStdHandle
GetStringTypeW
MultiByteToWideChar
HeapFree
InterlockedDecrement
InterlockedIncrement
HeapAlloc
VirtualAlloc
SetThreadContext
VirtualFree
IsValidCodePage
FlushFileBuffers
GetOEMCP
GetACP
GetCPInfo
GetConsoleMode
GetConsoleCP
SetFilePointer
RtlUnwind
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetStartupInfoW
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
HeapReAlloc
HeapSize
GetProcessHeap
ExitThread
DecodePointer
EncodePointer
GetCommandLineW
HeapSetInformation
RaiseException
TerminateProcess
UnhandledExceptionFilter
IsProcessorFeaturePresent
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
user32
DispatchMessageW
PostThreadMessageA
PeekMessageW
TranslateMessage
MsgWaitForMultipleObjects
ShowWindow
GetInputState
wsprintfW
advapi32
RegCloseKey
RegOpenKeyExW
RegDeleteValueW
RegQueryValueExW
RegCreateKeyW
RegSetValueExW
ws2_32
WSAWaitForMultipleEvents
WSAIoctl
connect
WSAStartup
select
WSAResetEvent
setsockopt
WSACleanup
recv
socket
closesocket
send
WSASetLastError
WSACreateEvent
shutdown
WSAEventSelect
WSAEnumNetworkEvents
WSAGetLastError
WSACloseEvent
htons
gethostbyname
winmm
timeGetTime
Sections
.text Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ