Static task
static1
Behavioral task
behavioral1
Sample
d148dedc9b654f78a2ddd2298663df99d57d00cdec9e97a3722496cc51c60701.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d148dedc9b654f78a2ddd2298663df99d57d00cdec9e97a3722496cc51c60701.exe
Resource
win10v2004-20240802-en
General
-
Target
4db18bb82c0143d95eea29fb1416348936007290889eb5ab1f5332d09db43bdb
-
Size
631KB
-
MD5
54728c023824893a5f4a3c6ae7b8ca94
-
SHA1
3bba448ead2f2f5600e15cd30df0de6c2afb9c06
-
SHA256
4db18bb82c0143d95eea29fb1416348936007290889eb5ab1f5332d09db43bdb
-
SHA512
0a33bdf5ff01f2f3ef45d6478db9f689a9a301d28427621fc4dad403e2ad752c7432beba5e1f266a5e10ef46481bde47c20a9ecf2917e5c44e8bc5e8c73f4cc9
-
SSDEEP
12288:cXw0rEUxF31poMTJUhmHy+FuinVKjl0ivZfJLPplVZ/KxARFa0h:ywkEUxFFpoEJRHpFuwulZDLxlV0xUA0h
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/d148dedc9b654f78a2ddd2298663df99d57d00cdec9e97a3722496cc51c60701.exe
Files
-
4db18bb82c0143d95eea29fb1416348936007290889eb5ab1f5332d09db43bdb.zip
Password: infected
-
d148dedc9b654f78a2ddd2298663df99d57d00cdec9e97a3722496cc51c60701.exe.exe windows:5 windows x86 arch:x86
ce771cc7f72cb42764d30ed3fa34abca
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumResourceNamesW
HeapCompact
SetEndOfFile
LocalCompact
CreateHardLinkA
EnumResourceTypesA
GlobalAlloc
LoadLibraryW
IsProcessInJob
AssignProcessToJobObject
CreateEventA
IsBadWritePtr
GetLastError
GetCurrentDirectoryW
SetLastError
GetProcAddress
IsBadHugeWritePtr
VerLanguageNameA
SetConsoleCtrlHandler
AddAtomW
GlobalHandle
Module32FirstW
GetModuleFileNameA
GetOEMCP
HeapSetInformation
GetFileTime
GetCurrentThreadId
GetDiskFreeSpaceExA
ReadConsoleInputW
WriteConsoleW
CloseHandle
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetStdHandle
SetFilePointer
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
GetStringTypeW
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
GetCommandLineW
GetStartupInfoW
GetCPInfo
RaiseException
RtlUnwind
HeapAlloc
LCMapStringW
IsProcessorFeaturePresent
GetModuleHandleW
ExitProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
HeapCreate
ReadFile
WriteFile
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoW
HeapSize
GetACP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
HeapReAlloc
CreateFileW
user32
CharUpperBuffA
SetCursorPos
SetCaretPos
GetCaretBlinkTime
GetMessageTime
ChangeMenuW
Sections
.text Size: 641KB - Virtual size: 640KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 47KB - Virtual size: 28.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gelez Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.lop Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ