Static task
static1
Behavioral task
behavioral1
Sample
11eb08d4313711c1753029776d19d11eaabba4af381b456ccc405cd1d5784752.exe
Resource
win7-20240704-en
General
-
Target
2edc069ff3ad923a690b87b479a5730b.bin
-
Size
197KB
-
MD5
4a7c76fca35938f7ee0f4884ec8fd5b3
-
SHA1
a6858afc110c67e34484efffa88df88789b549ab
-
SHA256
8dcae0b2e68c483751fcdb97b5782ffdb9b8d8122e72196e4f07fca6b5ce93fa
-
SHA512
e6aad0ffcfc48a9273643f09fbcc226d33b1de112d3e9ab11620128d7ea2fecf57a1936e10fb6c8c06b859edd5ab43a547c9a35df75caecb4b50ae2e5e20a934
-
SSDEEP
6144:TqZm41o02hZR3LjebR915/eZSfSJiJf5kG+zTjs9:eZh1/2hZR6b3eZhkJQjq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/11eb08d4313711c1753029776d19d11eaabba4af381b456ccc405cd1d5784752.exe
Files
-
2edc069ff3ad923a690b87b479a5730b.bin.zip
Password: infected
-
11eb08d4313711c1753029776d19d11eaabba4af381b456ccc405cd1d5784752.exe.exe windows:6 windows x64 arch:x64
Password: infected
44607e735c962183ec1fe579ca4c8317
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
user32
ShowWindow
kernel32
TlsSetValue
SetEndOfFile
Sleep
GetConsoleWindow
LoadLibraryA
GetProcAddress
WriteConsoleW
CloseHandle
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
EncodePointer
DecodePointer
InitializeCriticalSectionEx
MultiByteToWideChar
WideCharToMultiByte
LCMapStringEx
GetStringTypeW
GetCPInfo
RtlUnwindEx
RtlPcToFileHeader
RaiseException
GetLastError
SetLastError
TlsAlloc
TlsGetValue
RtlUnwind
TlsFree
FreeLibrary
LoadLibraryExW
GetCurrentProcess
TerminateProcess
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
HeapFree
HeapAlloc
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
GetConsoleOutputCP
GetConsoleMode
GetFileSizeEx
SetFilePointerEx
ReadFile
ReadConsoleW
FlushFileBuffers
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
SetStdHandle
HeapReAlloc
HeapSize
CreateFileW
Sections
.text Size: 161KB - Virtual size: 161KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 151KB - Virtual size: 150KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ