Static task
static1
Behavioral task
behavioral1
Sample
ef95ceaeaf01a38e1b6352269b6b2fd6168edc38f03cff5bc236bfbea3c42272.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef95ceaeaf01a38e1b6352269b6b2fd6168edc38f03cff5bc236bfbea3c42272.exe
Resource
win10v2004-20240802-en
General
-
Target
2296af679c8ecd95e69a5316feeac781.zip
-
Size
32KB
-
MD5
4c9a475ca16d51653844b8ae3fe2f862
-
SHA1
a47dd838dc37d7146a75442e514be8ca4f3bce1e
-
SHA256
5c2033c4d46aa8714638a10def69c36f38d4efca09c5e373dedf5f373895e831
-
SHA512
354d8372333f1c7b05196b43828eee0e325059074233dd93342cdaf06ae35ad776c1ab9c7eb1e0ad03c6a13471440556824ebf660f29bb20ed592f5623e9ef67
-
SSDEEP
768:t/YwG6KAn1y5YPSGdF1NO0VAEr3majbdaQLsHvctmB:t8GQ5wSMxO0VnThj0NqmB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/ef95ceaeaf01a38e1b6352269b6b2fd6168edc38f03cff5bc236bfbea3c42272
Files
-
2296af679c8ecd95e69a5316feeac781.zip.zip
Password: infected
-
ef95ceaeaf01a38e1b6352269b6b2fd6168edc38f03cff5bc236bfbea3c42272.exe windows:4 windows x86 arch:x86
Password: infected
b7b36544c7913d18eb11f60f9865553a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSection
DeleteCriticalSection
GetProcAddress
LoadLibraryA
LeaveCriticalSection
EnterCriticalSection
CloseHandle
WaitForSingleObject
lstrcpyA
InterlockedExchange
Sleep
WritePrivateProfileStringA
GetPrivateProfileStringA
SetThreadPriority
GetLastError
SetUnhandledExceptionFilter
CreateThread
GetModuleHandleA
GetStartupInfoA
user32
wsprintfA
MessageBoxA
shell32
ShellExecuteA
msvcrt
_exit
_controlfp
??3@YAXPAX@Z
memmove
ceil
_ftol
strstr
__CxxFrameHandler
??2@YAPAXI@Z
_CxxThrowException
sprintf
exit
strtok
_beginthreadex
fclose
fputs
fopen
rand
srand
fputc
_except_handler3
ftell
fseek
atoi
strchr
strncpy
strcspn
??1type_info@@UAE@XZ
__dllonexit
_onexit
fgetc
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
ws2_32
htons
gethostbyname
socket
ntohs
recv
closesocket
connect
send
inet_addr
WSACleanup
sendto
WSAStartup
htonl
gethostname
inet_ntoa
setsockopt
select
Sections
.data Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ex_cod Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ex_rsc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ