Static task
static1
Behavioral task
behavioral1
Sample
03c8d8d9ef35d718c7aa375230a1b1a76ea19ad5b0d5e87681f9935ce55702e6.exe
Resource
win7-20240704-en
General
-
Target
f2e2363ba761eff6077735e74d85256a.zip
-
Size
314KB
-
MD5
56c50cb82744f3245ca7e20bddf2ed4b
-
SHA1
044c757af8d6b4cb0aefc1763f91605af1952ece
-
SHA256
cc7cd5fdd77938ac99d1b11a51c314b2e0e95729287e00da98c537a007a7cd06
-
SHA512
de8d4d6e4eb71411b9ec8fb466b6dc1f8121613e9f3ea266376cfeefa1b56d26c5b3a0d9b82b13b9005aeb982462b8906a0f76b60bd70d757591b22dfa0ec2b9
-
SSDEEP
6144:ngehMakHLcVzsI8LFRANLQlLYwA9H0XoVxfvOHieqXY52uGYry1IBWSviVoK4T:ngehXoLcVz5iRANL8NWH0XIhkiXXYYwn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/03c8d8d9ef35d718c7aa375230a1b1a76ea19ad5b0d5e87681f9935ce55702e6
Files
-
f2e2363ba761eff6077735e74d85256a.zip.zip
Password: infected
-
03c8d8d9ef35d718c7aa375230a1b1a76ea19ad5b0d5e87681f9935ce55702e6.exe windows:4 windows x86 arch:x86
Password: infected
a8070c6ad7600bbdd417216375913d93
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
CreatePropertySheetPageA
PropertySheetA
kernel32
GetTempFileNameA
GetTempPathA
GetModuleHandleA
ResumeThread
SetPriorityClass
GetCurrentProcess
GetCurrentThread
SetThreadPriority
CreateProcessA
GetModuleFileNameA
DeleteFileA
RemoveDirectoryA
GetPrivateProfileIntA
GetPrivateProfileStringA
SetLastError
CreateDirectoryA
GetFileAttributesA
GetFileSize
CreateFileA
CreateFileMappingA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
CloseHandle
SetFileTime
DosDateTimeToFileTime
GetLastError
FormatMessageA
LocalFree
FreeLibrary
MultiByteToWideChar
LoadLibraryA
GetProcAddress
lstrlenA
MapViewOfFile
UnmapViewOfFile
user32
MessageBoxA
GetFocus
wsprintfA
SetCursor
GetDlgItem
SendDlgItemMessageA
GetParent
PostMessageA
GetWindowRect
MoveWindow
LoadCursorA
RegisterClassA
CreateWindowExA
ShowWindow
UpdateWindow
DefWindowProcA
BeginPaint
GetSystemMetrics
EndPaint
PeekMessageA
TranslateMessage
DispatchMessageA
GetDC
ReleaseDC
SendMessageA
SetDlgItemTextA
gdi32
SetBkMode
SetTextColor
DeleteObject
CreateDIBitmap
SelectObject
CreateFontA
CreateSolidBrush
TextOutA
advapi32
RegCloseKey
RegQueryValueExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegEnumKeyExA
RegQueryValueA
ole32
CoCreateInstance
CoInitialize
CoUninitialize
msvcr80
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
_strnicmp
_stricmp
_close
_read
_open
_strdup
_crt_debugger_hook
__set_app_type
_encode_pointer
strchr
memcpy
memset
strncat
strcat
strlen
strcpy
_localtime64
_time64
strtol
free
malloc
_putenv
_fstat64i32
fprintf
__iob_func
remove
fread
ftell
fseek
fopen
fclose
fflush
freopen
_snprintf
strncpy
strcmp
strrchr
_vsnprintf
sscanf
fwrite
strftime
sprintf
isspace
qsort
realloc
fgets
strncmp
__argv
__argc
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_tempnam
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 404KB - Virtual size: 996KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ