Static task
static1
Behavioral task
behavioral1
Sample
738b9fcf0f3a70565f478032bb950652d182c6cf8e738a42e048df91a6c15a37.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
738b9fcf0f3a70565f478032bb950652d182c6cf8e738a42e048df91a6c15a37.exe
Resource
win10v2004-20240802-en
General
-
Target
cf45389b62d0001ec494b81f864c4af2.zip
-
Size
9KB
-
MD5
2d6df90735c939687f8cbad80152ca19
-
SHA1
e49f20a262877001bfa3e3e157155512675d256d
-
SHA256
6d5f657e86446fa91f2048719813e30401ec94ea1bda235c6689849862d85cfa
-
SHA512
6d1684c1c931688281b747d9ae85bf4bb42e1578f5ddb044d0cf3309ca9b11b3e0dd5518c0047c29461717fd421963e46039bccd4973fdb645da514c1c95ac16
-
SSDEEP
192:JJX1mYiwkY/uy2rIgO3pflT485NVqWhX43L56LSBSd9DczXCvS:Jwouy2YTr5NVTo7jBe9DcB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/738b9fcf0f3a70565f478032bb950652d182c6cf8e738a42e048df91a6c15a37
Files
-
cf45389b62d0001ec494b81f864c4af2.zip.zip
Password: infected
-
738b9fcf0f3a70565f478032bb950652d182c6cf8e738a42e048df91a6c15a37.exe windows:5 windows x86 arch:x86
Password: infected
444361781dee8fd0353521af5f624c97
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
UpdateWindow
ShowWindow
PostQuitMessage
GetMessageA
DispatchMessageA
TranslateMessage
CreateWindowExW
RegisterClassExA
DefWindowProcA
SendMessageA
LoadIconA
LoadCursorA
kernel32
GetStartupInfoA
lstrcpyA
GetModuleHandleA
CloseHandle
GetCommandLineW
LoadLibraryExA
CreateEventW
comctl32
ord17
shfolder
SHGetFolderPathA
shell32
SHGetMalloc
FindExecutableA
SHFreeNameMappings
SHGetDataFromIDListA
SHGetDiskFreeSpaceA
ExtractIconA
CommandLineToArgvW
DragQueryFileA
DragFinish
DragQueryPoint
SHGetFileInfoA
ShellAboutA
msvcrt
_initterm
__getmainargs
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
_acmdln
exit
_XcptFilter
_exit
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ