Static task
static1
Behavioral task
behavioral1
Sample
d779e1b9b965342481f87fc756c097f891ad2a68cc697dba97e17a3eff5524b9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d779e1b9b965342481f87fc756c097f891ad2a68cc697dba97e17a3eff5524b9.exe
Resource
win10v2004-20240802-en
General
-
Target
b8d272df7aabcd95d8891e14abb641e5.zip
-
Size
73KB
-
MD5
9afa50626b940e73d1788aaafbffa48a
-
SHA1
a35f8d52ea4fb22dd5bb1f8bfe55886de500cee6
-
SHA256
620c875b1a568d84163e2fc8999cb3f4d01b6ade36a1103349aaf32475f0de89
-
SHA512
8b5fa9af5a588a5462f759e31a5e8f6572674bd64bad871a6b471f109eeaaeb9bd5e9a626819e8bf61f4215d232b9a1227044fba74483c1d51f383082eb72daf
-
SSDEEP
1536:aaTegq9S3v7JVQ6SLNfSi7U9CbYzW9l50EPYKdrjpkCXuz:a3gq9YQ3NaiuC8zWH57eCez
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/d779e1b9b965342481f87fc756c097f891ad2a68cc697dba97e17a3eff5524b9
Files
-
b8d272df7aabcd95d8891e14abb641e5.zip.zip
Password: infected
-
d779e1b9b965342481f87fc756c097f891ad2a68cc697dba97e17a3eff5524b9.exe windows:4 windows x86 arch:x86
Password: infected
0ab8af968841351a6340b418cb8a364d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
RegisterClassExA
TranslateMessage
PostQuitMessage
LoadIconA
LoadCursorA
GetMessageA
DispatchMessageA
DefWindowProcA
SendMessageA
CreateWindowExA
CharLowerA
kernel32
lstrlenA
lstrcpyA
lstrcmpiA
BeginUpdateResourceA
CloseHandle
CopyFileA
CreateFileA
CreateFileMappingA
CreateThread
DeleteFileA
EndUpdateResourceA
EnumResourceNamesA
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
FindResourceA
FreeLibrary
GetCommandLineA
GetDriveTypeA
GetEnvironmentVariableA
GetFileAttributesA
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetShortPathNameA
GetSystemDefaultLangID
GetTickCount
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
LoadLibraryA
LoadResource
LockResource
MapViewOfFile
MoveFileA
ReadFile
RtlMoveMemory
SetEndOfFile
SetFilePointer
SizeofResource
Sleep
UnmapViewOfFile
UpdateResourceA
WinExec
WriteFile
lstrcatA
lstrcmpA
shlwapi
PathFindExtensionA
urlmon
URLDownloadToFileA
advapi32
RegCreateKeyA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
shell32
ShellExecuteA
dbghelp
MakeSureDirectoryPathExists
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ