Static task
static1
Behavioral task
behavioral1
Sample
29a55c552259024a357b2ab68d7bbb72c99ea93f648fe0960459420193148815.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
29a55c552259024a357b2ab68d7bbb72c99ea93f648fe0960459420193148815.exe
Resource
win10v2004-20240802-en
General
-
Target
161e74106d46e94656ab6b481e815ff78f831bd265d4db49bf0b769e0f46986c
-
Size
58KB
-
MD5
de2e71c480bc1b71f1e83d997f36b1ed
-
SHA1
45e89031e9c021933ed6fbb8f346d740bf1587be
-
SHA256
161e74106d46e94656ab6b481e815ff78f831bd265d4db49bf0b769e0f46986c
-
SHA512
1a985ec02f96fac272774a8b70fd31474715732f53a0039a2679c58d10ce3b6868ef2a5c7356ce53e04e133711f4110a2aa18402db8567057f2c9713eee8dbc6
-
SSDEEP
1536:H1i73apS47HIgAXQDUYChbB9NN5ImBkcy:HYCl7HpAoUxZNOj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/29a55c552259024a357b2ab68d7bbb72c99ea93f648fe0960459420193148815
Files
-
161e74106d46e94656ab6b481e815ff78f831bd265d4db49bf0b769e0f46986c.zip
Password: infected
-
29a55c552259024a357b2ab68d7bbb72c99ea93f648fe0960459420193148815.exe windows:4 windows x86 arch:x86
5b509220cd547c39018121b39128d48d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
UnregisterWait
GetSystemWindowsDirectoryA
CompareStringW
lstrcmpW
SetLastError
InitializeCriticalSectionAndSpinCount
CreateSemaphoreW
CreateEventW
ReleaseSemaphore
LockResource
LoadResource
FindClose
FindFirstFileW
CreateProcessW
DebugBreak
GetThreadContext
VirtualAlloc
VirtualQuery
GetVersion
FreeLibraryAndExitThread
SetThreadPriority
GetCurrentThread
CreateThread
CloseHandle
CreateEventA
SetEvent
ResetEvent
HeapCreate
HeapDestroy
HeapAlloc
HeapFree
lstrlenW
DuplicateHandle
GetLocalTime
WaitForSingleObject
OutputDebugStringA
RaiseException
QueueUserWorkItem
CreateTimerQueueTimer
CopyFileW
TlsFree
lstrcmpiA
GetExitCodeProcess
CreateProcessA
SetErrorMode
GetVersionExA
GetFileAttributesW
GetFileSize
SetFileAttributesW
GetThreadPriority
TerminateThread
GetProfileIntA
FreeLibrary
LocalAlloc
Sleep
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetProfileStringA
HeapSetInformation
GetCPInfo
ExpandEnvironmentStringsW
GetCommandLineW
MultiByteToWideChar
GetSystemTime
GetThreadLocale
GetTimeFormatW
GetConsoleOutputCP
LocalFree
GetStdHandle
WideCharToMultiByte
CreateFileW
GetProcessHeap
IsBadStringPtrW
VirtualLock
IsValidCodePage
OutputDebugStringW
TlsGetValue
SetUnhandledExceptionFilter
GetFullPathNameW
GetCommandLineA
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
lstrlenA
InitializeCriticalSection
DisableThreadLibraryCalls
user32
AdjustWindowRectEx
CheckMenuItem
advapi32
RegCloseKey
ChangeServiceConfig2W
DeleteService
RegCreateKeyExW
RegSetValueExA
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
CreateServiceW
shell32
CommandLineToArgvW
ole32
CoWaitForMultipleHandles
CoTaskMemAlloc
CoTaskMemFree
CoCreateFreeThreadedMarshaler
StringFromGUID2
msvcrt
memset
strpbrk
strspn
sscanf
fgets
strchr
wcstoul
free
malloc
exit
wcschr
wcstok
wcsrchr
Sections
.text Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 292KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ