Static task
static1
Behavioral task
behavioral1
Sample
6fedeaeaafbf32a6fcfc3f113d91e73921954ae54ac76e20c9faadca1b3ad571.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6fedeaeaafbf32a6fcfc3f113d91e73921954ae54ac76e20c9faadca1b3ad571.exe
Resource
win10v2004-20240802-en
General
-
Target
9bf58d866d64094278c0ce340b48cbee.zip
-
Size
9KB
-
MD5
267d6ad8eab3ae8cc070fe5bedd69781
-
SHA1
c0838644574a5fb2860f01b5c026327e1cc8630f
-
SHA256
fbfea23fcce83896565ddb3f784e42ecf33ead606a7122efd463c38f989e4cd8
-
SHA512
6c15d42a6398b639451039c494fb3882c346b2490d1533a874546c8dac5da8889e12338f2b08c021f08f71adc6817f674f6fd4f376102cd6e70c7c124298077d
-
SSDEEP
192:fcg+A0AWaUAHfR0aWqqr4dZAbnSewkASHjB+/yWFuGxJgTWXijzsswBhS8l:fcIHWatfRtqr4dub9wHSH9GxJDcsswBV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/6fedeaeaafbf32a6fcfc3f113d91e73921954ae54ac76e20c9faadca1b3ad571
Files
-
9bf58d866d64094278c0ce340b48cbee.zip.zip
Password: infected
-
6fedeaeaafbf32a6fcfc3f113d91e73921954ae54ac76e20c9faadca1b3ad571.exe windows:5 windows x86 arch:x86
Password: infected
c585d9b7637cb43fc6a3b820441b7ebb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetDC
ReleaseDC
CreateCursor
DestroyCursor
ShowCursor
AppendMenuA
DrawTextExA
CharUpperA
CreateAcceleratorTableA
DrawEdge
GetClientRect
RegisterWindowMessageA
MoveWindow
DragDetect
GetCapture
CreateDialogIndirectParamA
ReleaseCapture
FindWindowA
kernel32
lstrlen
SetLastError
GetCommandLineA
GetStartupInfoA
ExitProcess
HeapFree
GetModuleHandleA
lstrlenA
MapViewOfFile
HeapDestroy
MultiByteToWideChar
CreateDirectoryA
ole32
CoInitialize
CoUninitialize
CoCreateInstanceEx
oleaut32
SysAllocStringLen
SysFreeString
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ