Static task
static1
Behavioral task
behavioral1
Sample
02c6f9163a5d988cee3ab12c11e03b18329c26d6b4863004f943133654693e97.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
02c6f9163a5d988cee3ab12c11e03b18329c26d6b4863004f943133654693e97.exe
Resource
win10v2004-20240802-en
General
-
Target
a3247152e18ba6e88311f082a86515d3.bin
-
Size
111KB
-
MD5
ae4802ea79e5fa009bcf99179d6a0eef
-
SHA1
1651f3242e597ea74fa346e01933d16211ca2c70
-
SHA256
714f0c6f63ab2f3290eab02829e6c71b156c96bbc8f274df3c11e839665c6bfd
-
SHA512
72949731fd569e8a53b74cbb7a22e908b4d851e6406160e21e47d3015a0669ed3321010adde4755b2f37e4291ec473c04dc575605444d3c39c4cda657aa44996
-
SSDEEP
1536:6M9ES+BBnHUvYXrqLM5yXbN/CdRWa4kpZTZ1eP3U67QfI006Hw5jcWkdHIBixEOg:6M4HYuqo5CbNQR79W3bJ0K6oBRnLP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/02c6f9163a5d988cee3ab12c11e03b18329c26d6b4863004f943133654693e97.exe
Files
-
a3247152e18ba6e88311f082a86515d3.bin.zip
Password: infected
-
02c6f9163a5d988cee3ab12c11e03b18329c26d6b4863004f943133654693e97.exe.exe windows:5 windows x86 arch:x86
48018783cf28f3141db6304599edb5a2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameA
GetFullPathNameA
GetNumaProcessorNode
GetProcessIoCounters
OpenJobObjectA
UnlockFile
GetTimeFormatA
GetModuleHandleW
GetTickCount
GetDateFormatA
GetSystemTimes
GlobalAlloc
LoadLibraryW
FormatMessageW
InitAtomTable
HeapCreate
FlushInstructionCache
GetProcAddress
GetNumaHighestNodeNumber
GetAtomNameA
LoadLibraryA
InterlockedExchangeAdd
SetCalendarInfoW
VirtualLock
HeapLock
GetCommMask
GetCurrentConsoleFont
SetCommMask
FoldStringA
lstrcatW
FreeEnvironmentStringsW
VirtualProtect
EnumDateFormatsW
SetFileShortNameA
DebugBreak
GetModuleHandleA
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
ReadFile
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
InterlockedDecrement
Sleep
HeapSize
ExitProcess
WriteFile
GetModuleFileNameA
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
VirtualFree
HeapFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
VirtualAlloc
HeapReAlloc
RtlUnwind
MultiByteToWideChar
InitializeCriticalSectionAndSpinCount
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
FlushFileBuffers
CreateFileA
CloseHandle
RaiseException
user32
InflateRect
GetActiveWindow
LoadIconA
Sections
.text Size: 165KB - Virtual size: 165KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ