Static task
static1
Behavioral task
behavioral1
Sample
dc6c2f9d57aee159b5c6453b56c93fa6976f83a3685b388aff968e5dfe498841.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc6c2f9d57aee159b5c6453b56c93fa6976f83a3685b388aff968e5dfe498841.exe
Resource
win10v2004-20241007-en
General
-
Target
c61f76c54ce0f89894ef870a48c5497c.bin
-
Size
126KB
-
MD5
77797b2704575b01f3cdd3ccc1bd3f4b
-
SHA1
a83f1036fedcdb5b487f57c79f198e381f5fa582
-
SHA256
577533558f161a77c1faa8a24ae76929b6fe726b8e5a47caaa1cbf1ef6f50afe
-
SHA512
4fef45d20d2ad2ee1d52dbece253a10ec50a41d6a7554edf20db26f0382f37c10a45486849342cc976cd4929368e8b487bff1dd636e8b50dd9531609555b6a74
-
SSDEEP
3072:ViUx445TXxe9cstmW3Nf8wKiJqCJNzqD95sKQOf88kT:3n5DxscG8wKequNG/u
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/dc6c2f9d57aee159b5c6453b56c93fa6976f83a3685b388aff968e5dfe498841.exe
Files
-
c61f76c54ce0f89894ef870a48c5497c.bin.zip
Password: infected
-
dc6c2f9d57aee159b5c6453b56c93fa6976f83a3685b388aff968e5dfe498841.exe.exe windows:5 windows x86 arch:x86
636068238a0ab0df9c8e341eee8428d0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleAliasExesLengthA
DeleteVolumeMountPointA
OpenJobObjectA
ReadConsoleA
InterlockedDecrement
GlobalSize
SetDefaultCommConfigW
InterlockedCompareExchange
GetComputerNameW
SetEvent
GetNumaAvailableMemoryNode
FreeEnvironmentStringsA
GetModuleHandleW
GetConsoleAliasesLengthA
SetCommState
GetConsoleWindow
ReadConsoleOutputW
GetVersionExW
GetStringTypeExW
HeapDestroy
GetFileAttributesA
GetTimeFormatW
SearchPathW
GetBinaryTypeA
DisconnectNamedPipe
LCMapStringA
GetLastError
GetProcAddress
MoveFileW
SetStdHandle
GetNumaHighestNodeNumber
LoadLibraryA
LocalAlloc
WritePrivateProfileStringA
QueryDosDeviceW
GetModuleFileNameA
BuildCommDCBA
FatalAppExitA
GetShortPathNameW
SetCalendarInfoA
FindAtomW
SetConsoleMode
PulseEvent
HeapAlloc
MultiByteToWideChar
Sleep
ExitProcess
GetCommandLineA
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
WriteFile
GetStdHandle
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
InitializeCriticalSectionAndSpinCount
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
advapi32
ClearEventLogW
Sections
.text Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 39.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.beve Size: 14KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cac Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 115KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ