Static task
static1
Behavioral task
behavioral1
Sample
58bded444fa5ac1c5d9bc34b6e155667d088f089d50923fc759162a6e9ad1e4d.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
58bded444fa5ac1c5d9bc34b6e155667d088f089d50923fc759162a6e9ad1e4d.exe
Resource
win10v2004-20241007-en
General
-
Target
0e0cfe7e42cf47bd12e769993d692283.bin
-
Size
115KB
-
MD5
48ff7588829b049d369be8fe2ce55a54
-
SHA1
08bf5bc9cc5f5575e39caf6f655f7235090832f8
-
SHA256
40ac15e5d63ab7ac175f98db45bcac37ddd422e737608d0e7db245f0ffe12da5
-
SHA512
696c629198e33c904ea15039d50e33e55d85bb12bcbeec84e5ff3bdce7853cf09885d736d6d6fa5b8efaf36fd04f39e6b3c1fdbf460bbb91c17860cfb6aed974
-
SSDEEP
3072:fr6LuHba36RBCRhMF7c23X+J56iAv51kA2P7BSu4GVEu:T+qRBCRaF7r3uGiobkA2TBSNGJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/58bded444fa5ac1c5d9bc34b6e155667d088f089d50923fc759162a6e9ad1e4d.exe
Files
-
0e0cfe7e42cf47bd12e769993d692283.bin.zip
Password: infected
-
58bded444fa5ac1c5d9bc34b6e155667d088f089d50923fc759162a6e9ad1e4d.exe.exe windows:5 windows x86 arch:x86
Password: infected
93748bcd8307b417457e392dc371dfe1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DebugActiveProcess
SetProcessAffinityMask
SetDefaultCommConfigA
GetNumaProcessorNode
GetLocaleInfoA
CallNamedPipeA
InterlockedIncrement
MoveFileExW
GetConsoleAliasA
GlobalSize
GetEnvironmentStringsW
Process32First
GlobalLock
FreeEnvironmentStringsA
GetModuleHandleW
GetTickCount
FormatMessageA
GetSystemWow64DirectoryW
GetConsoleAliasExesLengthW
GetStringTypeExW
HeapDestroy
GetFileAttributesA
GetTimeFormatW
SetConsoleCursorPosition
GetModuleFileNameW
GetConsoleFontSize
GetACP
GetStartupInfoA
GetStdHandle
GetLogicalDriveStringsA
GetProcAddress
SetVolumeLabelW
MoveFileW
VirtualAllocEx
BuildCommDCBW
LoadLibraryA
InterlockedExchangeAdd
OpenWaitableTimerW
LocalAlloc
SetCommMask
FindAtomA
SetNamedPipeHandleState
GetModuleHandleA
OpenFileMappingW
PurgeComm
GetVersionExA
ReadConsoleOutputCharacterW
LocalFileTimeToFileTime
CloseHandle
WriteConsoleW
MultiByteToWideChar
GetLastError
HeapReAlloc
HeapAlloc
GetCommandLineA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedDecrement
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
Sleep
HeapSize
ExitProcess
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapCreate
VirtualFree
HeapFree
VirtualAlloc
WriteFile
GetModuleFileNameA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
InitializeCriticalSectionAndSpinCount
RtlUnwind
SetFilePointer
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
CreateFileA
Sections
.text Size: 121KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 39.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ