Static task
static1
Behavioral task
behavioral1
Sample
6798b30915ded323d8ca7f310a7d518cfa5de39bcc20ae984c9a3b65ccbeb941.exe
Resource
win7-20240708-en
General
-
Target
0ddaf55ff5b6daf269845dee74b4f24b.bin
-
Size
1.5MB
-
MD5
ea3e022774a89f7970ae652552161556
-
SHA1
cebe0d8b0ad0d0a580f369c2ca98b8dbf9d8c070
-
SHA256
581ccffb152ff38f2b1d411bec32e5d0fdcee33a15a957a9f776f839a50723a4
-
SHA512
2d888f44640c98d07c1e0b363f2a946fc08949a24155d74be222355b8b44266a1edcfd7b54e58a5b38e1dea760d7c866c84415d785caf9dccb60444406526435
-
SSDEEP
24576:6RW0LF9P0ENrTpbM4InAeEeFPYMeuVrqRbnj21KhTldPH27PKsdqBMKAEh5/uD56:OW0/P0orHIAeEKTeu5qJnj5BuPKs0BMS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/6798b30915ded323d8ca7f310a7d518cfa5de39bcc20ae984c9a3b65ccbeb941.exe
Files
-
0ddaf55ff5b6daf269845dee74b4f24b.bin.zip
Password: infected
-
6798b30915ded323d8ca7f310a7d518cfa5de39bcc20ae984c9a3b65ccbeb941.exe.exe windows:4 windows x86 arch:x86
Password: infected
41db2083dac89343aef584a51a80b293
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
CryptAcquireContextA
CryptGenRandom
CryptReleaseContext
kernel32
DeleteCriticalSection
EnterCriticalSection
FreeLibrary
GetLastError
GetModuleHandleA
GetModuleHandleW
GetNativeSystemInfo
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetThreadLocale
HeapAlloc
HeapFree
InitializeCriticalSection
IsBadReadPtr
IsDBCSLeadByteEx
LeaveCriticalSection
LoadLibraryA
MultiByteToWideChar
SetLastError
SetUnhandledExceptionFilter
Sleep
TlsGetValue
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WideCharToMultiByte
lstrlenA
msvcrt
__getmainargs
__initenv
__mb_cur_max
__p__acmdln
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_amsg_exit
_assert
_cexit
_errno
_chsize
_exit
_filelengthi64
_fileno
_initterm
_iob
_lock
_onexit
_unlock
_wcsnicmp
abort
atoi
bsearch
calloc
exit
fclose
fflush
fgetpos
fopen
fputc
fread
free
freopen
fsetpos
fwrite
getc
islower
isspace
isupper
isxdigit
localeconv
malloc
mbstowcs
memcmp
memcpy
memmove
memset
mktime
localtime
difftime
_mkdir
perror
qsort
realloc
remove
setlocale
signal
strchr
strcmp
strerror
strlen
strncmp
strncpy
strtol
strtoul
tolower
ungetc
vfprintf
time
wcslen
wcstombs
_stat
_write
_utime
_open
_fileno
_close
_chmod
Sections
.text Size: 4.8MB - Virtual size: 4.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.eh_fram Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 428KB - Virtual size: 427KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ