Static task
static1
Behavioral task
behavioral1
Sample
32c4e4e9527d0c58b5de2e5de61d056144ec4a4ec37bcf737299ae72815b6a7a.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
32c4e4e9527d0c58b5de2e5de61d056144ec4a4ec37bcf737299ae72815b6a7a.exe
Resource
win10v2004-20240802-en
General
-
Target
e1d4e202be7eb671fe429cd6c8b839c8.zip
-
Size
153KB
-
MD5
effa2d772f3b5933942bab4bd6fb8a1e
-
SHA1
7b6f34ae059ec53fff0dec29e0efe794ebdf5f86
-
SHA256
ee7ac1a19f1c89f078c76a85110226971dc35b73b390225938290f4f4ea7726f
-
SHA512
a05e4899769433d3011962e875be5a31f719f5ac6552c1421c7078992980c84b1987378fc104d9a24103de9bcee296eee21f8018ac7c283af8007693a4861289
-
SSDEEP
3072:M9bQ/qWBagW8jzS5WQnKb0CYiZFPCdwiD1NFdwdeB2LfSmcdOHZuaIN+:M9bQ/qLEzDtnYwi37wA4bnwa9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/32c4e4e9527d0c58b5de2e5de61d056144ec4a4ec37bcf737299ae72815b6a7a
Files
-
e1d4e202be7eb671fe429cd6c8b839c8.zip.zip
Password: infected
-
32c4e4e9527d0c58b5de2e5de61d056144ec4a4ec37bcf737299ae72815b6a7a.exe windows:5 windows x86 arch:x86
Password: infected
b85f7741a49f0e564ff0742d092b0400
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
CreateFileW
GetFileSize
ReadFile
CloseHandle
VirtualAlloc
GetModuleHandleA
GetProcAddress
LoadLibraryA
VirtualFree
GetProcessHeap
GetCurrentProcess
TerminateProcess
HeapAlloc
HeapFree
Sections
.text Size: 170KB - Virtual size: 169KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 808B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ