Static task
static1
Behavioral task
behavioral1
Sample
3e9b442995fc472566f6689c275b24bb9d2a0244bd002671d471654d0b0893b0.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3e9b442995fc472566f6689c275b24bb9d2a0244bd002671d471654d0b0893b0.exe
Resource
win10v2004-20240802-en
General
-
Target
76b660aeed75fd20555985ca7c7c1edd.bin
-
Size
125KB
-
MD5
3258b496ec219ddea0fbec8a25049620
-
SHA1
d6350488fa460ab258d9c79f91df6a31f86972e5
-
SHA256
2c2cd37dab0e12fbaddac70477c0ed799a6d3cac84bed18a50e2d624be005dad
-
SHA512
12c8e385c42cbb26561bc7b8cb26a6ebd24ebec988daae020cfa2bd49f9d4cb2a508ffca36e0af4679249571cde105f3ee6ff925ed797bb0f3820c2bd976ecc0
-
SSDEEP
3072:qe8+y0d4zj+f29ea+2eLjfd39iT8c7ziSgqZFq3cp:qXjbj+f8eUeLjf+T8YiSgqZFucp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/3e9b442995fc472566f6689c275b24bb9d2a0244bd002671d471654d0b0893b0.exe
Files
-
76b660aeed75fd20555985ca7c7c1edd.bin.zip
Password: infected
-
3e9b442995fc472566f6689c275b24bb9d2a0244bd002671d471654d0b0893b0.exe.exe windows:6 windows x64 arch:x64
Password: infected
b568833c2b25e8c0876cca9c84e79cb3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
CreateFileA
WriteFile
CloseHandle
GetLastError
HeapAlloc
HeapFree
GetProcessHeap
SetCriticalSectionSpinCount
GetCurrentProcess
WriteProcessMemory
GetModuleHandleW
GetProcAddress
LoadLibraryA
MultiByteToWideChar
ConvertDefaultLocale
GetModuleHandleExW
FreeLibrary
ExitProcess
LCIDToLocaleName
RaiseException
VirtualQuery
RtlUnwindEx
TerminateProcess
InitializeSListHead
GetCurrentProcessId
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetLocaleInfoEx
LCMapStringEx
WideCharToMultiByte
DecodePointer
EncodePointer
GetSystemTimeAsFileTime
DeleteCriticalSection
InitializeCriticalSectionEx
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
Sleep
QueryPerformanceFrequency
QueryPerformanceCounter
user32
PostMessageW
RegisterClassW
DestroyWindow
ShowWindow
MoveWindow
IsWindowVisible
IsIconic
GetWindowTextW
GetWindowContextHelpId
GetWindowLongPtrW
GetClassNameW
IsDialogMessageW
LoadStringW
wininet
InternetCloseHandle
InternetOpenUrlA
InternetReadFile
InternetOpenW
msvcrt
__getmainargs
_environ
_msize
_XcptFilter
__set_app_type
__argc
__argv
?_set_new_mode@@YAHH@Z
_commode
_isatty
_fileno
__strncnt
_errno
realloc
abort
_fsopen
islower
_wcsdup
calloc
___lc_codepage_func
isupper
__pctype_func
malloc
_time64
ceilf
ungetc
setvbuf
_fseeki64
fsetpos
fread
fgetpos
fgetc
fflush
fclose
rand
srand
free
strlen
wcslen
_local_unwind
__DestructExceptionObject
__CxxFrameHandler3
_amsg_exit
__uncaught_exception
__C_specific_handler
_CxxThrowException
memset
memmove
memcpy
memcmp
memchr
?terminate@@YAXXZ
_iob
_unlock
_lock
strcpy_s
_set_fmode
_initterm_e
_initterm
_callnewh
fseek
___lc_handle_func
strchr
wcsrchr
Sections
.text Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 660B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 575KB - Virtual size: 574KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ