Static task
static1
Behavioral task
behavioral1
Sample
552d8d01f02ee396385097544499d26612e11a4cd0381a58c45436ec614ec02b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
552d8d01f02ee396385097544499d26612e11a4cd0381a58c45436ec614ec02b.exe
Resource
win10v2004-20240802-en
General
-
Target
43d76bf18879ca764124e78024c71efcf17992f7d402445653f23d3c6aa0cb26
-
Size
220KB
-
MD5
a09598a1d34468e727b7576a516a8640
-
SHA1
046b3fe97c8ffd06646962bb9b32baa2f610d4e2
-
SHA256
43d76bf18879ca764124e78024c71efcf17992f7d402445653f23d3c6aa0cb26
-
SHA512
380a5f0b8890e59a69e6e09d10b8e497f872846d9b7abeaa5957116bc9c2fbeb3855acfb5c556fcbea9c09437d7fc2283df508c5bb5b06581b6dd1c448aa9cf5
-
SSDEEP
6144:X6q/jjByeWDkDliopbLkv92Ex66lvspgs8BRC:X6q/hcYDZk2ExgyHC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/552d8d01f02ee396385097544499d26612e11a4cd0381a58c45436ec614ec02b
Files
-
43d76bf18879ca764124e78024c71efcf17992f7d402445653f23d3c6aa0cb26.zip
Password: infected
-
552d8d01f02ee396385097544499d26612e11a4cd0381a58c45436ec614ec02b.exe windows:6 windows x86 arch:x86
7e6d410cb0ee9d4d9be8ad4e6fd75b64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
GetSystemInfo
GetTickCount
GetModuleHandleW
FindResourceW
GetConsoleWindow
CreateFileW
HeapSize
GetProcessHeap
SetStdHandle
SetEnvironmentVariableW
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
LCMapStringEx
GetStringTypeW
GetCPInfo
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetCurrentProcess
TerminateProcess
RaiseException
RtlUnwind
GetLastError
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
HeapAlloc
HeapFree
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
CloseHandle
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
ReadFile
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
HeapReAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
WriteConsoleW
user32
ShowWindow
MessageBoxA
MessageBeep
Sections
.text Size: 136KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.uj12uxQ Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 115KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ