Static task
static1
Behavioral task
behavioral1
Sample
c514c22ccbdf3b66a902f2d02b4515920656ac636ce2a4fc683961c25702c59e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c514c22ccbdf3b66a902f2d02b4515920656ac636ce2a4fc683961c25702c59e.exe
Resource
win10v2004-20240802-en
General
-
Target
ae6112b72845c6a495561783ac5eeffd.bin
-
Size
136KB
-
MD5
a0aaf86280e3f50837cc5ac007df4545
-
SHA1
1cc808fb44f613e65a342bc47243c7b2fa9423fe
-
SHA256
e6430b065f29d9ad4e8885be4f4f8c2de2d8da9b0292ff3b05586a469c9a4e87
-
SHA512
686dc8b8834f17bbb4497dfb36ea1b1a7bf80ed28be607d2899e25d21dc88146d987ed9c9619776dc108a245a093a76e02865ced19b07cc4aa313eaf097c40c9
-
SSDEEP
3072:bkb9jDWGNO7Vq8l7GFhbqBA/iu1CbbAZo0vRsgV5osj9MR:QZjhWVXZGFkAqM3lRF5g
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/c514c22ccbdf3b66a902f2d02b4515920656ac636ce2a4fc683961c25702c59e.exe
Files
-
ae6112b72845c6a495561783ac5eeffd.bin.zip
Password: infected
-
c514c22ccbdf3b66a902f2d02b4515920656ac636ce2a4fc683961c25702c59e.exe.exe windows:5 windows x86 arch:x86
Password: infected
08c523df338764c8f5fe9f2030103e8d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetNumaNodeProcessorMask
GetConsoleAliasesLengthW
GetNumaProcessorNode
WriteConsoleOutputW
InterlockedDecrement
QueryDosDeviceA
GetUserDefaultLCID
CallNamedPipeW
FreeEnvironmentStringsA
GetModuleHandleW
GetCommandLineA
GetSystemTimes
GetPriorityClass
GetEnvironmentStrings
GlobalAlloc
LoadLibraryW
GetConsoleMode
CopyFileW
GetConsoleAliasExesLengthW
HeapDestroy
GetFileAttributesA
GlobalFlags
GetBinaryTypeA
SetConsoleTitleA
DisconnectNamedPipe
GetShortPathNameA
CreateDirectoryA
GetComputerNameA
GetStartupInfoA
FillConsoleOutputCharacterW
GetLastError
GetProcAddress
SetStdHandle
EnterCriticalSection
SearchPathA
OpenWaitableTimerA
LoadLibraryA
SetCalendarInfoW
WritePrivateProfileStringA
FindAtomA
FoldStringW
GetModuleFileNameA
GetDefaultCommConfigA
ContinueDebugEvent
FreeEnvironmentStringsW
BuildCommDCBA
GlobalReAlloc
SetFileAttributesW
CopyFileExA
WriteConsoleW
CloseHandle
InterlockedExchange
DebugActiveProcess
EncodePointer
DecodePointer
MultiByteToWideChar
ExitProcess
GetCommandLineW
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
ReadFile
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
Sleep
HeapSize
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
WriteFile
GetModuleFileNameW
GetEnvironmentStringsW
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
HeapFree
RtlUnwind
HeapReAlloc
WideCharToMultiByte
LCMapStringW
GetStringTypeW
IsProcessorFeaturePresent
GetConsoleCP
FlushFileBuffers
CreateFileW
user32
GetUserObjectInformationA
advapi32
RegCreateKeyA
Sections
.text Size: 97KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 39.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 113KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ