Static task
static1
Behavioral task
behavioral1
Sample
b4a211aceed06bec30a8f6eeb8c543a03d2f63501c229400ea8d0ce097d27826.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b4a211aceed06bec30a8f6eeb8c543a03d2f63501c229400ea8d0ce097d27826.exe
Resource
win10v2004-20240802-en
General
-
Target
8d0279673052698747f71ab2eec2cb21.zip
-
Size
25KB
-
MD5
6798c5e43917f3991e7e116a2a9f148c
-
SHA1
da12b0295c6c4ef91adf9c28a4ae008abff95778
-
SHA256
12bc52818d291d53ed0c74bdb15d61336c9cfa11e068e412afde376c41798c52
-
SHA512
f7220ad3692e4d55e24b009c30021ef4d149dc1e2eacb4412cb73aacfe261186713ea8591c4fa23f5a6a8f540c8e6b88e48b0ea3f6765ac76f79590e1f7320c4
-
SSDEEP
768:bJmbJYowjSmAEqcEXcIzJGpnbu31kNr4NoqVqr8ocy:MbJY3CcIQpnbAat
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/b4a211aceed06bec30a8f6eeb8c543a03d2f63501c229400ea8d0ce097d27826
Files
-
8d0279673052698747f71ab2eec2cb21.zip.zip
Password: infected
-
b4a211aceed06bec30a8f6eeb8c543a03d2f63501c229400ea8d0ce097d27826.exe windows:4 windows x86 arch:x86
Password: infected
ea6c8092f8807723f1489f32ba14c9f4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LoadIconW
LoadCursorW
RegisterClassExW
GetMessageW
TranslateMessage
DispatchMessageW
DefWindowProcW
SendMessageW
DestroyWindow
DialogBoxParamW
BeginPaint
DrawTextW
EndPaint
PostQuitMessage
SetFocus
EndDialog
CreateWindowExW
kernel32
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetOEMCP
GetACP
GetCPInfo
WideCharToMultiByte
GetEnvironmentStringsW
VirtualFree
ReadFile
GetTickCount
LoadLibraryA
CreateFileA
GetSystemDirectoryW
CloseHandle
CreateFileW
LoadLibraryW
GetCommandLineW
RtlUnwind
WriteFile
HeapAlloc
VirtualAlloc
HeapFree
GetEnvironmentStrings
GetProcAddress
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
gdi32
DeleteObject
CreateSolidBrush
SetTextAlign
GetStockObject
comctl32
InitCommonControlsEx
shell32
CommandLineToArgvW
DragFinish
ExtractIconA
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ