Static task
static1
Behavioral task
behavioral1
Sample
ff4c03965c0c4c428eaa7ddbb442ae1537e78efb0d9ec07a10f793b7d6153a58.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ff4c03965c0c4c428eaa7ddbb442ae1537e78efb0d9ec07a10f793b7d6153a58.exe
Resource
win10v2004-20240508-en
General
-
Target
1ee22348c50e6aa7c055ae0e006a96ab.bin
-
Size
228KB
-
MD5
361080a96ac1779f5f2f1047ab34b8f1
-
SHA1
8331756e747be170378f080ab6c6458ce553d942
-
SHA256
acb6d4f70b2a452c72338453ce56934a20676efae606108cae3277953693dde0
-
SHA512
ad811cf1cb3ccc5512650caf95f5e9275f35b2fea55cde9f59b8382a5fbc4aeef71dcb5826119d9e1a3df9bcfa2c1a0781a3d580fda56f77f771ad1a5934fcf3
-
SSDEEP
6144:mmLtNFv6e6XstIuI9URTs4Yay0Cx+eGSmLrlomY7MY:mmLpvH682uIS9CNWLr+vMY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/ff4c03965c0c4c428eaa7ddbb442ae1537e78efb0d9ec07a10f793b7d6153a58.exe
Files
-
1ee22348c50e6aa7c055ae0e006a96ab.bin.zip
Password: infected
-
ff4c03965c0c4c428eaa7ddbb442ae1537e78efb0d9ec07a10f793b7d6153a58.exe.exe windows:5 windows x86 arch:x86
Password: infected
04c19b0a4924298ad5f0ee3be3224e92
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetVolumeMountPointW
GetComputerNameW
SleepEx
GetCommProperties
GetModuleHandleW
GetTickCount
ReadConsoleOutputA
GlobalAlloc
lstrcpynW
WriteConsoleW
GetModuleFileNameW
GetConsoleAliasesW
CreateJobObjectW
GetProcAddress
BuildCommDCBW
GetAtomNameA
LoadLibraryA
UnhandledExceptionFilter
InterlockedExchangeAdd
AddAtomA
FoldStringA
lstrcatW
EnumDateFormatsW
FindFirstVolumeA
AreFileApisANSI
OpenJobObjectA
ZombifyActCtx
GetLastError
GetConsoleAliasExesLengthA
CreateFileA
GetConsoleOutputCP
MultiByteToWideChar
HeapAlloc
HeapReAlloc
GetStartupInfoW
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
VirtualAlloc
HeapCreate
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
SetHandleCount
GetFileType
GetStartupInfoA
HeapSize
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
InitializeCriticalSectionAndSpinCount
RtlUnwind
ReadFile
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
SetStdHandle
CloseHandle
WriteConsoleA
gdi32
GetBoundsRect
advapi32
EnumDependentServicesA
ole32
CoTaskMemRealloc
winhttp
WinHttpAddRequestHeaders
Sections
.text Size: 210KB - Virtual size: 209KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 34.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ