Static task
static1
Behavioral task
behavioral1
Sample
1581c975ec062365d4434b399ce3b139c60d8e0ff70685ac66fba98648aba8a9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1581c975ec062365d4434b399ce3b139c60d8e0ff70685ac66fba98648aba8a9.exe
Resource
win10v2004-20240802-en
General
-
Target
60ebd7c31329425915c61c72aef5a3db.zip
-
Size
8KB
-
MD5
a919ab3cf537da52836d8eb9c5741a4a
-
SHA1
b136ca4c887b463d1ef0848c76cfcbe538d64bf4
-
SHA256
d09a3ba5ffd6abfa2957b9c422a43204f7ff960c83c3f4366328f664ef81a4bc
-
SHA512
26d5e324035c074e4292511d1846603f42ac7607e5d0d70be6c00dea34bb4edc6347327d45fa055309c996821a1f993ec2fe99e695e6f07e084d3247f1ba5c82
-
SSDEEP
192:c9SkZ6WbAQfZyQDnbGqEQu1bwg2JO9+ncIXRN+rbsvaDL9y:HkAWb9YQ3G3QuwgEOvIBNHyDk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/1581c975ec062365d4434b399ce3b139c60d8e0ff70685ac66fba98648aba8a9
Files
-
60ebd7c31329425915c61c72aef5a3db.zip.zip
Password: infected
-
1581c975ec062365d4434b399ce3b139c60d8e0ff70685ac66fba98648aba8a9.exe windows:4 windows x86 arch:x86
Password: infected
3bf52cce958af28c47ecfbb6d0a01caa
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetWindowTextW
SetCapture
GetActiveWindow
IsChild
SendMessageA
MessageBoxA
TrackPopupMenu
CreateWindowExA
TranslateMessage
DispatchMessageA
GetMessageA
PostQuitMessage
ShowWindow
FlashWindowEx
GetKeyState
TranslateAcceleratorA
RegisterClassA
DefWindowProcA
GetDlgItemTextA
kernel32
GetProcessHeap
GetModuleHandleA
CloseHandle
GetVersionExA
ExitProcess
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 268B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 232B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ