untitled.pdb
Static task
static1
Behavioral task
behavioral1
Sample
563d3e127d92bd8b8e15ee95f7d30e950ec30d41d4cd20658f5443273eea96c7.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
563d3e127d92bd8b8e15ee95f7d30e950ec30d41d4cd20658f5443273eea96c7.exe
Resource
win10v2004-20240802-en
General
-
Target
ca9e2fafc81b855386aaf7a50906efa4.bin
-
Size
1.1MB
-
MD5
a5c125464cd3600f6e4bfea4158a3b89
-
SHA1
4367193c8408cbe59f1bafb39b81af0ad113ae0b
-
SHA256
54277b124985db0e2d2cf38412ee891a2b6bfc0ef441023d510b8bc501bb57c2
-
SHA512
625c480050783583190f95cd77394a8ba0307e4ba0e85d7c61e4ae4a67a64dc31f16f735d066ed03e3059fb60c85ecc34b01ee2ef7b59fbf7f0c92e847fb8922
-
SSDEEP
24576:iPcLHJEq3tAwdZTOwq8oUF4qvK98wMyO19T3h9nN8qkPD:iP0xnOXjUGGSPVA9bh9v8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/563d3e127d92bd8b8e15ee95f7d30e950ec30d41d4cd20658f5443273eea96c7.exe
Files
-
ca9e2fafc81b855386aaf7a50906efa4.bin.zip
Password: infected
-
563d3e127d92bd8b8e15ee95f7d30e950ec30d41d4cd20658f5443273eea96c7.exe.exe windows:6 windows x64 arch:x64
Password: infected
5585b0e8bd7b95f85318c79385189be7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
bcryptprimitives
ProcessPrng
api-ms-win-core-synch-l1-2-0
WaitOnAddress
WakeByAddressAll
WakeByAddressSingle
kernel32
SetHandleInformation
GetCurrentProcess
CreateIoCompletionPort
GetCurrentThreadId
GetQueuedCompletionStatusEx
PostQueuedCompletionStatus
GetSystemTimeAsFileTime
InitializeSListHead
SetFileCompletionNotificationModes
Sleep
GetModuleHandleA
GetProcAddress
IsDebuggerPresent
UnhandledExceptionFilter
AddVectoredExceptionHandler
SetThreadStackGuarantee
GetCurrentThread
SwitchToThread
WaitForSingleObject
QueryPerformanceCounter
GetSystemInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
SetLastError
GetCurrentDirectoryW
GetEnvironmentVariableW
SetUnhandledExceptionFilter
GetStdHandle
GetCurrentProcessId
QueryPerformanceFrequency
HeapFree
GetLastError
HeapReAlloc
lstrlenW
ReleaseMutex
GetProcessHeap
HeapAlloc
GetFinalPathNameByHandleW
SwitchToFiber
CreateFiber
GetConsoleMode
VirtualProtect
GetModuleHandleW
FormatMessageW
MultiByteToWideChar
WriteConsoleW
WideCharToMultiByte
CreateThread
WaitForSingleObjectEx
LoadLibraryA
CreateMutexA
VirtualAlloc
ConvertThreadToFiber
CloseHandle
IsProcessorFeaturePresent
ws2_32
WSASend
WSAIoctl
recv
shutdown
ioctlsocket
connect
bind
WSASocketW
getsockname
getpeername
setsockopt
closesocket
getaddrinfo
WSAGetLastError
freeaddrinfo
WSAStartup
WSACleanup
getsockopt
send
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
secur32
ApplyControlToken
EncryptMessage
AcceptSecurityContext
InitializeSecurityContextW
FreeContextBuffer
DecryptMessage
DeleteSecurityContext
QueryContextAttributesW
AcquireCredentialsHandleA
FreeCredentialsHandle
crypt32
CertDuplicateCertificateChain
CertFreeCertificateChain
CertGetCertificateChain
CertVerifyCertificateChainPolicy
CertFreeCertificateContext
CertDuplicateCertificateContext
CertEnumCertificatesInStore
CertAddCertificateContextToStore
CertOpenStore
CertCloseStore
CertDuplicateStore
ntdll
NtCancelIoFileEx
NtDeviceIoControlFile
RtlNtStatusToDosError
NtWriteFile
NtCreateFile
vcruntime140
__CxxFrameHandler3
__current_exception_context
__current_exception
memcpy
__C_specific_handler
_CxxThrowException
memmove
memcmp
memset
api-ms-win-crt-math-l1-1-0
pow
__setusermatherr
api-ms-win-crt-runtime-l1-1-0
_exit
exit
__p___argc
__p___argv
_cexit
_c_exit
_register_thread_local_exe_atexit_callback
_initterm_e
_configure_narrow_argv
_seh_filter_exe
_initialize_onexit_table
_register_onexit_function
_crt_atexit
terminate
_initialize_narrow_environment
_set_app_type
_get_initial_narrow_environment
_initterm
api-ms-win-crt-stdio-l1-1-0
__p__commode
_set_fmode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-heap-l1-1-0
_set_new_mode
free
Sections
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1015KB - Virtual size: 1014KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ