Static task
static1
Behavioral task
behavioral1
Sample
2a6c90c8db27e6ac04c7e339dfe4b3c2d47a292bcf6fc1c5b4e0ae62fc81ff84.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2a6c90c8db27e6ac04c7e339dfe4b3c2d47a292bcf6fc1c5b4e0ae62fc81ff84.exe
Resource
win10v2004-20240802-en
General
-
Target
4f0b7596807a10a623017aa0b4be82e2f62f3a1ed7bbcad2ce66016c256e0de4
-
Size
639KB
-
MD5
a18de11142d15f9546762af9b2277b28
-
SHA1
b4fc19f7429a2cb9cf60e86f8e132c7706b5d466
-
SHA256
4f0b7596807a10a623017aa0b4be82e2f62f3a1ed7bbcad2ce66016c256e0de4
-
SHA512
03563e39c6af22a01b97d19487a3950b9c191210642a114d5e4bd5e8f84bc6100ac557a379f76e825e6fde2be117b0c1c70ff3176917bc7b06395629b9e08aeb
-
SSDEEP
12288:ApCCPHHq3TUxBlXh7HZwroNc99+H54fpzRWOtusgimW5qFkYk4BYj8vn60q9o6:ICYqDcBlXh7HZwqc99+ZuBRZt8zW5qJg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/2a6c90c8db27e6ac04c7e339dfe4b3c2d47a292bcf6fc1c5b4e0ae62fc81ff84.exe
Files
-
4f0b7596807a10a623017aa0b4be82e2f62f3a1ed7bbcad2ce66016c256e0de4.zip
Password: infected
-
2a6c90c8db27e6ac04c7e339dfe4b3c2d47a292bcf6fc1c5b4e0ae62fc81ff84.exe.exe windows:5 windows x86 arch:x86
00e87a3230db3a6bdb4035240d620685
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateJobObjectW
InterlockedCompareExchange
UnlockFile
CreateHardLinkA
GetTickCount
GetNumberFormatA
GetConsoleAliasExesW
SetCommState
GlobalAlloc
LoadLibraryW
LocalShrink
GetCalendarInfoA
SetVolumeMountPointA
GetSystemWindowsDirectoryA
GetConsoleAliasExesLengthW
SetConsoleCP
GetFileAttributesA
GetModuleFileNameW
CreateActCtxA
GetThreadPriorityBoost
VerifyVersionInfoW
GetLogicalDriveStringsA
GetCurrentDirectoryW
SetLastError
GetProcAddress
CreateNamedPipeA
GetConsoleDisplayMode
GetProcessVersion
SetEnvironmentVariableW
InterlockedExchangeAdd
CreateFileMappingW
GetNumberFormatW
CreateEventW
OpenEventA
QueryDosDeviceW
GlobalWire
EnumDateFormatsA
EnumResourceNamesA
VirtualProtect
WaitForDebugEvent
PeekConsoleInputA
GetShortPathNameW
SetProcessShutdownParameters
SetFileShortNameA
GetDiskFreeSpaceExA
ReadConsoleInputW
GetTempPathA
EnumCalendarInfoExA
LCMapStringW
CommConfigDialogW
HeapReAlloc
RtlUnwind
HeapSize
RaiseException
SetDefaultCommConfigW
GetCurrentProcess
SetEndOfFile
LoadLibraryA
GetLocaleInfoA
MultiByteToWideChar
GetLastError
HeapFree
HeapAlloc
GetModuleHandleW
ExitProcess
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
IsProcessorFeaturePresent
HeapCreate
WriteFile
GetStdHandle
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
WideCharToMultiByte
GetStringTypeW
Sleep
user32
LoadMenuW
CharUpperW
GetSysColor
GetMenuStringA
GetCaretPos
DrawStateA
gdi32
GetCharWidthFloatA
CreateDCW
GetCharWidth32A
GetBitmapBits
Sections
.text Size: 644KB - Virtual size: 643KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 94KB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 73KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ