Static task
static1
Behavioral task
behavioral1
Sample
ef435776f8f7bef99e56c36c9335f4a7b368a04ae3d34e45b20c8f557b806894.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef435776f8f7bef99e56c36c9335f4a7b368a04ae3d34e45b20c8f557b806894.exe
Resource
win10v2004-20240802-en
General
-
Target
604380fff2d54fb5b474cf5c6aa91eee.zip
-
Size
15KB
-
MD5
acb3b1d7f8532da56b877bb862645602
-
SHA1
8e0898878874537af13214bb49b5f7aaf358ec84
-
SHA256
7b180ed0d0201662ba56d0ba214a14cd44124e72d926ea9762355f4eba3d3a85
-
SHA512
40ad09983781edc8b33e3a51ddccd701d5f35134b44235b6822151120a340b9d17b103c23e3d7bda1b60ff0d133107406a4d88070b19d84ca8758691ca74bd47
-
SSDEEP
192:0uNbHnIrJ7t+S+ixDvTvsh4livdrL3VQzurq5oySUtYtG1MnkPlYf38doPlHC:0uRe+S1xTTkh4cXVRrqmTOYIxYfMslHC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/ef435776f8f7bef99e56c36c9335f4a7b368a04ae3d34e45b20c8f557b806894
Files
-
604380fff2d54fb5b474cf5c6aa91eee.zip.zip
Password: infected
-
ef435776f8f7bef99e56c36c9335f4a7b368a04ae3d34e45b20c8f557b806894.exe windows:4 windows x86 arch:x86
Password: infected
170193414cc4abf0ae27dc2a19d74879
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateDirectoryW
MoveFileW
ReadFile
SetFilePointer
CreateFileW
WriteFile
GetDriveTypeW
GetSystemDirectoryW
GetProcAddress
GetModuleHandleW
GetSystemDefaultLangID
GetTickCount
GetCurrentProcessId
GetComputerNameW
FreeLibrary
LoadLibraryW
GetVersionExW
GetCurrentProcess
OpenProcess
GetVolumeInformationA
Process32NextW
TerminateProcess
Process32FirstW
CreateProcessW
lstrlenW
SetFileTime
GetFileSize
DeleteFileW
Sleep
WinExec
GetModuleFileNameA
MultiByteToWideChar
PeekNamedPipe
GetStartupInfoW
CreatePipe
WaitForSingleObject
CreateThread
RemoveDirectoryW
GetTempPathW
ExitProcess
SetStdHandle
DuplicateHandle
WideCharToMultiByte
SetLastError
LoadLibraryA
GetModuleHandleA
CloseHandle
GetModuleFileNameW
SetErrorMode
FindClose
GetLogicalDriveStringsW
GetVolumeInformationW
GetDiskFreeSpaceExW
FindFirstFileW
FindNextFileW
GetLastError
CreateToolhelp32Snapshot
GetStartupInfoA
user32
ExitWindowsEx
advapi32
GetTokenInformation
RegDeleteValueW
RegSetValueExW
RegCloseKey
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
LookupAccountSidW
GetUserNameW
RegOpenKeyW
shell32
SHFileOperationW
psapi
EnumProcessModules
GetModuleFileNameExW
msvcrt
_controlfp
__set_app_type
__p__fmode
swprintf
wcslen
wcscpy
memset
memcpy
??2@YAPAXI@Z
wcscmp
__CxxFrameHandler
_EH_prolog
wcscat
wcsrchr
_wcsnicmp
_except_handler3
_wcslwr
sprintf
strcpy
strcmp
rand
srand
strlen
time
atoi
free
_stricmp
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
shlwapi
PathFindFileNameW
PathFileExistsW
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ