Static task
static1
Behavioral task
behavioral1
Sample
0599250511b7b3ec63303fa14e98edef3092d61614e07106cf274bd6d43b2451.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0599250511b7b3ec63303fa14e98edef3092d61614e07106cf274bd6d43b2451.exe
Resource
win10v2004-20240802-en
General
-
Target
fd192fb05e0cd219b14c5bf345f33cfb.bin
-
Size
230KB
-
MD5
de6fd7bbe11ae4dccbe746e7a7e8c9f0
-
SHA1
90affea3babd438a4fa332c6f51e5efca3ee4218
-
SHA256
6b7da7d4f0f2dbd38b401d08c6185d657ec09b5326fc9f645b1c09697714578b
-
SHA512
faed534d113155810991c12e01e3144dfc023ecd2e84d4189b08a3646fe24d08a7ef63d1314ff804841154d151da682fe32ad50a698521d7212f9ee1bcd5cff9
-
SSDEEP
6144:wF16is+qV2Q8YmbPY6xnMOVi02fmIPnJJ4O:dis0TYKPYyMXjPv4O
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/0599250511b7b3ec63303fa14e98edef3092d61614e07106cf274bd6d43b2451.exe
Files
-
fd192fb05e0cd219b14c5bf345f33cfb.bin.zip
Password: infected
-
0599250511b7b3ec63303fa14e98edef3092d61614e07106cf274bd6d43b2451.exe.exe windows:5 windows x86 arch:x86
Password: infected
f11d3344d5447b8895a001459fe30f13
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateJobObjectW
InterlockedCompareExchange
UnlockFile
CreateHardLinkA
GetTickCount
CreateNamedPipeW
GetNumberFormatA
GetConsoleAliasExesW
SetCommState
GlobalAlloc
LoadLibraryW
LocalShrink
GetCalendarInfoA
SetVolumeMountPointA
GetSystemWindowsDirectoryA
GetConsoleAliasExesLengthW
SetConsoleCP
GetFileAttributesW
GetModuleFileNameW
CreateActCtxA
GetThreadPriorityBoost
VerifyVersionInfoW
GetLogicalDriveStringsA
GetCurrentDirectoryW
SetLastError
GetProcAddress
GetConsoleDisplayMode
GetProcessVersion
SetEnvironmentVariableW
InterlockedExchangeAdd
CreateFileMappingW
GetNumberFormatW
CreateEventW
OpenEventA
QueryDosDeviceW
GlobalWire
EnumDateFormatsA
EnumResourceNamesA
VirtualProtect
WaitForDebugEvent
PeekConsoleInputA
GetShortPathNameW
SetProcessShutdownParameters
SetFileShortNameA
GetDiskFreeSpaceExA
ReadConsoleInputW
GetTempPathA
EnumCalendarInfoExA
LCMapStringW
CommConfigDialogW
HeapReAlloc
RtlUnwind
HeapSize
RaiseException
SetDefaultCommConfigW
GetCurrentProcess
SetEndOfFile
GetLocaleInfoA
MultiByteToWideChar
GetLastError
HeapFree
HeapAlloc
GetModuleHandleW
ExitProcess
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
IsProcessorFeaturePresent
HeapCreate
WriteFile
GetStdHandle
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
WideCharToMultiByte
GetStringTypeW
Sleep
user32
LoadMenuW
CharUpperW
GetSysColor
GetMenuStringA
GetCaretPos
DrawStateA
gdi32
GetCharWidthFloatA
CreateDCW
GetCharWidth32A
GetBitmapBits
Sections
.text Size: 235KB - Virtual size: 235KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 94KB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 73KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ