Static task
static1
Behavioral task
behavioral1
Sample
de655c42cbccea9cffbc64fe92e06132199d668397aaf234f5e40eebde79f368.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
de655c42cbccea9cffbc64fe92e06132199d668397aaf234f5e40eebde79f368.exe
Resource
win10v2004-20240802-en
General
-
Target
6835f266fad4e3571e321f8e2673fca5.zip
-
Size
363KB
-
MD5
6ed3055eb1de51d9f92916ae045fb5a0
-
SHA1
34d72f562de61d1a0f7752e97f838defb7ce6bd3
-
SHA256
a1b9b2bbda0cfb5b6283aeb2a3fe9731c71b583f23ad39567ddcf8f699a53cdd
-
SHA512
5fa762e10bf9c9c5e0492efdf7aebd9963f03ff8528ec677c86f7dd01b5ec2314e7a66d9ad8ae54826873e06995f0b5cd3ba8dd917af7b69334a4a4c2b4690ee
-
SSDEEP
6144:rJgYJhzTs2UJC5wOUOmPfzj2RTeuE/xucM8yvqSub:FDJF5aUTlAxucMZub
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/de655c42cbccea9cffbc64fe92e06132199d668397aaf234f5e40eebde79f368
Files
-
6835f266fad4e3571e321f8e2673fca5.zip.zip
Password: infected
-
de655c42cbccea9cffbc64fe92e06132199d668397aaf234f5e40eebde79f368.exe windows:5 windows x86 arch:x86
Password: infected
50f8c2aaa5c7363385b763c509d8540d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
GetProcAddress
LoadLibraryW
GetComputerNameW
SystemTimeToFileTime
FileTimeToSystemTime
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
GetCurrentProcess
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
GetLastError
CloseHandle
InitializeCriticalSectionAndSpinCount
WideCharToMultiByte
MoveFileW
DeleteFileW
SetFileAttributesW
GetTempPathW
GetTempFileNameW
MoveFileExW
CreateFileW
GetFileSize
ReadFile
WriteFile
GetComputerNameA
GetModuleFileNameW
CreateProcessW
Sleep
GetSystemTime
FileTimeToLocalFileTime
RaiseException
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
SetEndOfFile
WriteConsoleW
SetStdHandle
ReadConsoleW
OutputDebugStringW
FreeLibrary
InterlockedIncrement
InterlockedDecrement
MultiByteToWideChar
GetStringTypeW
InterlockedExchange
EncodePointer
DecodePointer
GetCommandLineW
GetCurrentThreadId
LoadLibraryExW
RtlUnwind
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
IsProcessorFeaturePresent
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
ExitProcess
GetModuleHandleExW
GetStdHandle
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsDebuggerPresent
GetConsoleCP
GetConsoleMode
IsValidCodePage
GetACP
GetOEMCP
SetFilePointerEx
FlushFileBuffers
SetFilePointer
LoadLibraryExA
ole32
CoCreateInstance
CoInitialize
shlwapi
PathRemoveExtensionW
PathIsRootW
PathFileExistsW
PathAppendW
PathAddExtensionW
Sections
.text Size: 225KB - Virtual size: 225KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 219KB - Virtual size: 242KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ