Static task
static1
Behavioral task
behavioral1
Sample
61b19e50c036f22e03599acb09e8fd056f09a934b1efcc899bf53da2f398f492.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
61b19e50c036f22e03599acb09e8fd056f09a934b1efcc899bf53da2f398f492.exe
Resource
win10v2004-20240802-en
General
-
Target
e9da0023cfffc9b359cca49c1074f0dc3a1cc3ff72aefc248868e852eaae3321
-
Size
136KB
-
MD5
564db7bbd02c804ce6eccb07b660d6fa
-
SHA1
48da21b16a7087526ab4f380c78a37df66153062
-
SHA256
e9da0023cfffc9b359cca49c1074f0dc3a1cc3ff72aefc248868e852eaae3321
-
SHA512
bbc6e968687ffe933f878c764c29ffbce2fca370167af8771ac287b9dfeff0a6e51bcde2f70942ad831ac0aee257e43efad91a225bb8b5a3571f6905ec09c51a
-
SSDEEP
3072:Cz2GsEK9hRDkm8LxVUdgbV5ajoGd9ZUGw2JLsZLmwLT:CCGLKPpkDrQOVQEKZUA4ZzLT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/61b19e50c036f22e03599acb09e8fd056f09a934b1efcc899bf53da2f398f492
Files
-
e9da0023cfffc9b359cca49c1074f0dc3a1cc3ff72aefc248868e852eaae3321.zip
Password: infected
-
61b19e50c036f22e03599acb09e8fd056f09a934b1efcc899bf53da2f398f492.exe windows:5 windows x86 arch:x86
d18033035bcf4c93b44d25aae6a4aecf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEvent
SetVolumeMountPointA
InitializeCriticalSection
GetFileType
GetFileInformationByHandle
DeleteAtom
GetSystemTimeAdjustment
CreateFileW
GetSystemWindowsDirectoryW
LoadModule
WinExec
lstrlenA
lstrlenW
MultiByteToWideChar
GlobalAlloc
HeapReAlloc
HeapSize
WideCharToMultiByte
RtlUnwind
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
Sleep
LoadLibraryW
EnterCriticalSection
GetTapeStatus
GlobalLock
LoadLibraryA
lstrcpyA
lstrcatA
GetProcAddress
SetTapePosition
GetDriveTypeA
WriteProfileSectionW
WritePrivateProfileStringW
LCMapStringW
PeekConsoleInputA
LeaveCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
GetStringTypeW
QueryPerformanceCounter
GetCommandLineW
HeapSetInformation
GetStartupInfoW
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetLastError
HeapFree
HeapAlloc
GetModuleHandleW
ExitProcess
DecodePointer
WriteFile
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
user32
GetDC
CreateMDIWindowW
LoadCursorA
GetWindowTextA
SetWindowsHookA
GrayStringA
AppendMenuA
GetCaretPos
SetPropA
GetQueueStatus
SwitchDesktop
CloseWindow
ReplyMessage
SetClassLongW
DrawCaption
GetWindowTextLengthW
InsertMenuItemA
gdi32
GetTextExtentPointA
Ellipse
GetTextMetricsA
CreateRectRgnIndirect
GetDeviceGammaRamp
LineDDA
GetPolyFillMode
CheckColorsInGamut
GetLogColorSpaceW
advapi32
ReportEventA
ole32
CoInitialize
OleMetafilePictFromIconAndLabel
CoUnmarshalHresult
OleSetMenuDescriptor
CoMarshalHresult
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 137KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ