Static task
static1
Behavioral task
behavioral1
Sample
d806c7e9f4a145593b209dac56b31058a10f4f1d3a9d825a954ef1a182716b28.exe
Resource
win7-20240704-en
General
-
Target
19a0699324a13b72885d9173e232d256.bin
-
Size
212KB
-
MD5
c681f627a2b6af4e9e69afe6e28ba121
-
SHA1
cc85af91ab80a4eb4ac852d8166c64649e87a972
-
SHA256
a3855be122e43d1ba700e1d0b93611b9f645779cc86352f321f5edb68779aa5c
-
SHA512
6d66881daf8307e35282d3445e19d673053e01715186587cb3de9bc3e2291e505c2a607eb97cd0fac77c2aa890023fc8f5a964d2892310fb9f6b85f4dae12327
-
SSDEEP
6144:qZXsf0J2qe04Xu7e/0X2pEne/hdU+lRS+7R0Pvi3eP9:Ghm+7K0FOU+lOPVP9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/d806c7e9f4a145593b209dac56b31058a10f4f1d3a9d825a954ef1a182716b28.exe
Files
-
19a0699324a13b72885d9173e232d256.bin.zip
Password: infected
-
d806c7e9f4a145593b209dac56b31058a10f4f1d3a9d825a954ef1a182716b28.exe.exe windows:5 windows x86 arch:x86
Password: infected
17ae770feb0f16f58e2316f2fe122b8c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetDefaultCommConfigA
GetConsoleAliasExesA
CommConfigDialogA
GetConsoleAliasExesLengthA
OpenJobObjectA
GetLogicalDriveStringsW
GetSystemWindowsDirectoryW
QueryDosDeviceA
InterlockedCompareExchange
SetVolumeMountPointW
UnlockFile
OpenSemaphoreA
_lcreat
GetTickCount
GetNumberFormatA
CreateActCtxW
GlobalAlloc
SetFileShortNameW
LoadLibraryW
LocalShrink
GetCalendarInfoA
CreateEventA
SetVolumeMountPointA
SetConsoleCP
HeapDestroy
GetFileAttributesA
VerifyVersionInfoA
GetACP
GetShortPathNameA
CreateJobObjectA
LCMapStringA
GetLastError
GetCurrentDirectoryW
SetLastError
GetProcAddress
PeekConsoleInputW
CreateNamedPipeA
GlobalFree
GetProcessVersion
_hwrite
SetThreadPriorityBoost
LoadLibraryA
InterlockedExchangeAdd
CreateFileMappingW
CreateHardLinkW
GetNumberFormatW
SetConsoleWindowInfo
SetEnvironmentVariableA
GetModuleFileNameA
EnumResourceNamesA
VirtualProtect
EnumDateFormatsW
SetProcessShutdownParameters
GetDiskFreeSpaceExA
ReadConsoleInputW
GetCurrentProcessId
HeapSize
RtlUnwind
IsProcessorFeaturePresent
GetStringTypeW
LCMapStringW
WideCharToMultiByte
Sleep
HeapAlloc
MultiByteToWideChar
HeapReAlloc
GetCommandLineW
HeapSetInformation
GetStartupInfoW
GetModuleHandleW
ExitProcess
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
HeapFree
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
user32
ChangeMenuW
GetKeyNameTextA
LoadMenuA
GetWindowTextLengthA
GetDC
CharUpperBuffA
LoadMenuW
GetMenuState
GetMenuStringA
GetCaretBlinkTime
DdeQueryStringW
Sections
.text Size: 218KB - Virtual size: 217KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 93KB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 46KB - Virtual size: 398KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ