Static task
static1
Behavioral task
behavioral1
Sample
feb4c3ae4566f0acbb9e0f55417b61fefd89dc50a4e684df780813fb01d61278.exe
Resource
win7-20240708-en
General
-
Target
feb4c3ae4566f0acbb9e0f55417b61fefd89dc50a4e684df780813fb01d61278.zip
-
Size
4KB
-
MD5
4fb2d479a6ff78e07e48fbb1e00149dd
-
SHA1
d828144941a47fe630414b563603ed5febf7c39b
-
SHA256
8368ffa98daa46134b0d4578c03b613637e6a8e4ad87c24f39ef392e09f5f334
-
SHA512
6287a5c90dead1aa0b62a200ecb4b0f5db0e6605311116ec6a90d7029e766d3ca688809649fa7dd238c8d1ffe7e5a77dff8f9afabe1059a6d769faa886087b05
-
SSDEEP
96:QJhC1eSjFea32v9r76sO9foSEJlXY7zhiOReEUW83AMDKe+fbtL7:QPC1dZL9lEJlo/4OFWBlEtX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/feb4c3ae4566f0acbb9e0f55417b61fefd89dc50a4e684df780813fb01d61278.exe
Files
-
feb4c3ae4566f0acbb9e0f55417b61fefd89dc50a4e684df780813fb01d61278.zip.zip
Password: infected
-
feb4c3ae4566f0acbb9e0f55417b61fefd89dc50a4e684df780813fb01d61278.exe.exe windows:5 windows x86 arch:x86
Password: infected
7fda7734b056db13fe95f35927509e47
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFileExistsW
msvcr90
__set_app_type
?terminate@@YAXXZ
_unlock
_encode_pointer
_lock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
srand
rand
memset
__dllonexit
_crt_debugger_hook
wininet
InternetOpenA
InternetOpenUrlA
InternetOpenW
InternetOpenUrlW
InternetReadFile
InternetCloseHandle
urlmon
URLDownloadToFileW
kernel32
SetUnhandledExceptionFilter
GetStartupInfoA
GetTickCount
ExpandEnvironmentStringsW
CreateFileW
WriteFile
CloseHandle
DeleteFileW
CreateProcessW
Sleep
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
InterlockedCompareExchange
InterlockedExchange
user32
wsprintfW
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 908B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 688B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 510B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ