Static task
static1
Behavioral task
behavioral1
Sample
ac4e985b34d784c983669f7dba6018048d35a156627dade5c1440167d5adc5ca.exe
Resource
win7-20240903-en
General
-
Target
e74f77626d857bc78ed253336e06f5f3.bin
-
Size
213KB
-
MD5
edd46854284f51510ff8583b25602d63
-
SHA1
dcc1f4d231a9fba6b127e355246081c35d72d16a
-
SHA256
39fe572c144a5d69532b1cdc4a891498039f3dc450f62156d9d21634fb140cf9
-
SHA512
7e39155a54e5e86d615ab4b9099eba679443bc76e06849f801bcf6ddad47788607ad9b83b3195052e59707a1b8a600a7537e0d9e25d46aedfd2bba1be887be2a
-
SSDEEP
6144:uV8ma/9qR4y7Y35HMf68wpNj5D+OOGmuTbU1rI:uy5Ei53yyTbjReuTwI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/ac4e985b34d784c983669f7dba6018048d35a156627dade5c1440167d5adc5ca.exe
Files
-
e74f77626d857bc78ed253336e06f5f3.bin.zip
Password: infected
-
ac4e985b34d784c983669f7dba6018048d35a156627dade5c1440167d5adc5ca.exe.exe windows:5 windows x86 arch:x86
Password: infected
4466917f30d072b6b108006d1bc57b5b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FillConsoleOutputCharacterA
GetConsoleAliasesLengthW
GetNumaProcessorNode
DebugActiveProcessStop
GetDefaultCommConfigW
CallNamedPipeA
WriteConsoleOutputW
HeapAlloc
InterlockedDecrement
GlobalSize
GetEnvironmentStringsW
CreateDirectoryW
GetComputerNameW
GetSystemDefaultLCID
GetModuleHandleW
GetCommandLineA
GetSystemTimes
GlobalAlloc
LoadLibraryW
GetConsoleAliasExesLengthW
SetConsoleMode
GetFileAttributesW
GetBinaryTypeA
GetStartupInfoW
SetConsoleTitleA
GetShortPathNameA
InterlockedExchange
GetLastError
GetProcAddress
CopyFileA
SetStdHandle
EnterCriticalSection
SearchPathA
BuildCommDCBW
GetNumaHighestNodeNumber
OpenWaitableTimerA
LoadLibraryA
UnhandledExceptionFilter
WritePrivateProfileStringA
QueryDosDeviceW
VirtualLock
FoldStringW
GetModuleFileNameA
FreeEnvironmentStringsW
FindAtomW
CopyFileExA
SetFilePointer
WriteConsoleW
EncodePointer
DecodePointer
MultiByteToWideChar
ExitProcess
GetCommandLineW
HeapSetInformation
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
LeaveCriticalSection
Sleep
HeapSize
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapFree
RtlUnwind
HeapReAlloc
WideCharToMultiByte
LCMapStringW
GetStringTypeW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
IsProcessorFeaturePresent
ReadFile
CloseHandle
CreateFileW
user32
GetUserObjectInformationW
Sections
.text Size: 188KB - Virtual size: 188KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ