Static task
static1
Behavioral task
behavioral1
Sample
ea3ee2e3e5558a8267f3f5093144debf3263b5d3dea1598fa59ef7bde043c2b9.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ea3ee2e3e5558a8267f3f5093144debf3263b5d3dea1598fa59ef7bde043c2b9.exe
Resource
win10v2004-20240508-en
General
-
Target
1d2eb16a19024d792edd45a21be020dc.bin
-
Size
108KB
-
MD5
cc807c91ce579678ec3a5ffeac9132dc
-
SHA1
33fadb538be82d3154dda2b0d03b8c3669059d46
-
SHA256
bfb942560f04af6182a3f761bcca82a2baf908baa9ad08cc32d0c2dc64c48bde
-
SHA512
6735a727138c085f928e847494167bb87c77ae0949d3a25814d84ef2c9a1ee4e5e51bc4e78b9820a942597871c2db380dcd23055d26b023c2a7ec9ade5bca592
-
SSDEEP
3072:E+be9VCrOB1T7zxwyv22X+dojWC1sS8oyZwzA4:TfaB1T75hjWER8oj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/ea3ee2e3e5558a8267f3f5093144debf3263b5d3dea1598fa59ef7bde043c2b9.exe
Files
-
1d2eb16a19024d792edd45a21be020dc.bin.zip
Password: infected
-
ea3ee2e3e5558a8267f3f5093144debf3263b5d3dea1598fa59ef7bde043c2b9.exe.exe windows:5 windows x86 arch:x86
Password: infected
039b1745d3ec0d69297e0716539e775c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetVolumeMountPointW
GetComputerNameW
SleepEx
GetCommProperties
GetModuleHandleW
GetTickCount
ReadConsoleOutputA
GlobalAlloc
lstrcpynW
WriteConsoleW
GetModuleFileNameW
GetConsoleAliasesW
CreateJobObjectW
GetProcAddress
BuildCommDCBW
GetAtomNameA
LoadLibraryA
UnhandledExceptionFilter
InterlockedExchangeAdd
AddAtomA
FoldStringA
lstrcatW
EnumDateFormatsW
FindFirstVolumeA
AreFileApisANSI
OpenJobObjectA
ZombifyActCtx
GetLastError
GetConsoleAliasExesLengthA
CreateFileA
GetConsoleOutputCP
MultiByteToWideChar
HeapReAlloc
HeapAlloc
GetStartupInfoW
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
Sleep
HeapSize
ExitProcess
HeapCreate
VirtualFree
HeapFree
VirtualAlloc
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
ReadFile
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
SetStdHandle
CloseHandle
WriteConsoleA
gdi32
GetBoundsRect
advapi32
EnumDependentServicesA
ole32
CoTaskMemRealloc
winhttp
WinHttpAddRequestHeaders
Sections
.text Size: 90KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 34.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ