Static task
static1
Behavioral task
behavioral1
Sample
svc.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
svc.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
svc.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
svc.exe
Resource
win11-20240802-en
General
-
Target
svc.exe.zip
-
Size
133KB
-
MD5
8120b79c4428e3613bcf6d9341bd9033
-
SHA1
d2275553cd06fb01354afa60b0e95c78acc17fc3
-
SHA256
0db2cdca35f12d84a682f5e41091d718cb9c8dc4820fc2091a74d18ca559b5f6
-
SHA512
ee9bfefe48f3432972d3afdab55b551b983e8703c7cfe6a3897a1bb0d1ec945e6eff9aba5cbc87b020e0ec41943df7c1e8d00c33d7cbccaeeeabf657d08830f8
-
SSDEEP
3072:YvHNj1rAj+P/y54Y42DhMaMFA/rdz4hJFXjnPRsMAYK0Ym9/+:YfOcqzMaMUxzGFX7mMu0Ds
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/svc.exe.bin
Files
-
svc.exe.zip.zip
Password: infected
-
svc.exe.bin.exe windows:5 windows x86 arch:x86
abd58e636146ae1edca4aa616a47bb50
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleAliasesLengthW
CopyFileExW
GetNumaProcessorNode
OpenJobObjectA
ReadConsoleA
QueryDosDeviceA
GetEnvironmentStringsW
WaitForSingleObject
InterlockedCompareExchange
GetComputerNameW
GetNumaAvailableMemoryNode
BackupSeek
FreeEnvironmentStringsA
GetModuleHandleW
GetCommandLineA
GlobalAlloc
GetVolumeInformationA
GetConsoleMode
GetConsoleAliasExesLengthW
GetSystemTimeAdjustment
WriteConsoleOutputA
GetFileAttributesA
HeapCreate
GetBinaryTypeA
SetPriorityClass
GetStdHandle
GetLastError
GetProcAddress
MoveFileW
SearchPathA
LoadLibraryA
LocalAlloc
SetCalendarInfoW
SetCommMask
FindAtomA
CreatePipe
GetDefaultCommConfigA
GetModuleHandleA
BuildCommDCBA
PurgeComm
FatalAppExitA
WriteConsoleOutputAttribute
GetModuleFileNameW
SearchPathW
HeapFree
Sleep
ExitProcess
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapAlloc
VirtualAlloc
HeapReAlloc
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
WriteFile
GetModuleFileNameA
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
user32
GetUserObjectInformationW
SetFocus
advapi32
ObjectPrivilegeAuditAlarmW
Sections
.text Size: 95KB - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 991KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 102KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ