Static task
static1
Behavioral task
behavioral1
Sample
75f3aeb4ec5be62e718a0f3c32463af4d055a09151a3c79b16afb1daa6f537bb.exe
Resource
win7-20240729-en
General
-
Target
e3a08541070dcb1f4fe7d82af869c3bc.bin
-
Size
984KB
-
MD5
513ddce4ae6aefb98754b490b218d55c
-
SHA1
12c343ea40ce78d76ded4bbb6e26429f96b2d35d
-
SHA256
9602d230b96d3082ef80455411beebd292d5e789692f0df6ac52e2dbdf9480f7
-
SHA512
1dffcec85d9dd4fdb7081ab621a79ff5f0c44f3f427eb6174b1b0ea3b14b677c9a0dc85524457094838af4c4dc449713076c1490e72a1408b460d96a09e732bf
-
SSDEEP
24576:MS1OvC1iRnxWpydoWOyX4ZeaHYrWWR4wOTQ9vflVaNj:MTqMnx8yBHSeaHcWRwoQHvY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/75f3aeb4ec5be62e718a0f3c32463af4d055a09151a3c79b16afb1daa6f537bb.exe
Files
-
e3a08541070dcb1f4fe7d82af869c3bc.bin.zip
Password: infected
-
75f3aeb4ec5be62e718a0f3c32463af4d055a09151a3c79b16afb1daa6f537bb.exe.exe windows:5 windows x86 arch:x86
Password: infected
310f529f7ceda238fd1a8dcd68dc8454
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DebugActiveProcess
GetNumaNodeProcessorMask
GetDefaultCommConfigW
GetConsoleAliasExesLengthA
WriteConsoleOutputW
InterlockedDecrement
GlobalSize
GetEnvironmentStringsW
GetComputerNameW
CallNamedPipeW
GetModuleHandleW
GetConsoleAliasesLengthA
GetUserDefaultLangID
GetCommandLineA
GetSystemTimes
GlobalAlloc
LoadLibraryW
HeapDestroy
LeaveCriticalSection
GlobalFlags
SetConsoleMode
CreateDirectoryA
GetConsoleAliasesW
InterlockedExchange
GetStartupInfoA
GetLastError
GetProcAddress
SetStdHandle
SearchPathA
GetNumaHighestNodeNumber
LoadLibraryA
QueryDosDeviceW
FindNextChangeNotification
FindAtomA
FoldStringW
GetModuleFileNameA
FreeEnvironmentStringsW
VirtualProtect
EnumDateFormatsW
HeapAlloc
EncodePointer
DecodePointer
MultiByteToWideChar
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
Sleep
HeapSize
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
WideCharToMultiByte
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
EnterCriticalSection
HeapReAlloc
RtlUnwind
LCMapStringW
GetStringTypeW
HeapFree
IsProcessorFeaturePresent
Sections
.text Size: 1006KB - Virtual size: 1006KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 73KB - Virtual size: 985KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ