Static task
static1
Behavioral task
behavioral1
Sample
47a3680e1459bbb296401f0a7de60d6705a778b57548369a76cfbae1839e9f23.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
47a3680e1459bbb296401f0a7de60d6705a778b57548369a76cfbae1839e9f23.exe
Resource
win10v2004-20240802-en
General
-
Target
00a8351c05d23e83080dc19eb5b3090c.zip
-
Size
5KB
-
MD5
4c85662e7ecd1ac9f2eb3ab31e2bef73
-
SHA1
acf05720f8632407a28543e898cb860714ae8e43
-
SHA256
a2958ac9ab132702c0fb5b3f01de1a2a44ec8543af6b92a7cad22152ce556b5b
-
SHA512
422184b6fa1a5149c0d57b4576e1f16d238e3378f3b05e484957328be26eec21cf4630425cdf8c7efb39c9c2d101dbab9353bdb5d331215feacd3efb10a955c1
-
SSDEEP
96:/CinQ/aD69d07qi5K2GFGP3XAOHdVKRxptZmCt2ta47nP+NLec6OmxXDd9:HnQuXqeK2GE3QOHCBsCtSLLP+wRxzd9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/47a3680e1459bbb296401f0a7de60d6705a778b57548369a76cfbae1839e9f23
Files
-
00a8351c05d23e83080dc19eb5b3090c.zip.zip
Password: infected
-
47a3680e1459bbb296401f0a7de60d6705a778b57548369a76cfbae1839e9f23.exe windows:4 windows x86 arch:x86
Password: infected
1e4c0da5737da53aff5e6e0ab7de1efa
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
GetModuleFileNameA
GetSystemDirectoryA
GetWindowsDirectoryA
ExitProcess
OpenMutexA
Process32First
Process32Next
Sleep
CreateToolhelp32Snapshot
CreateMutexA
CopyFileA
OpenFile
CloseHandle
FindClose
FindFirstFileA
advapi32
RegOpenKeyExA
RegCreateKeyA
RegCloseKey
RegSetValueExA
shell32
SHGetSpecialFolderPathA
ShellExecuteA
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 692B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE