Static task
static1
Behavioral task
behavioral1
Sample
OFFICIAL PO 1143 FOB QATAR_jpeg.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
OFFICIAL PO 1143 FOB QATAR_jpeg.exe
Resource
win10v2004-20241007-en
General
-
Target
0c22d955534174aaffc23beb8b9fcee098a6f450ed1e5ac792a28d866089a035
-
Size
281KB
-
MD5
c03bb9b9ddecd2d7758df2f1b47dc5ea
-
SHA1
2566bc7b0bf121113f9eae5eaf804f608dfeda5d
-
SHA256
0c22d955534174aaffc23beb8b9fcee098a6f450ed1e5ac792a28d866089a035
-
SHA512
1f532112032916ae39fd3eed911702623c2be26b38a19b01cdc46d53227b653e60499be86bbc8f1b626d46437247ca75a7d683230af287ba56491c996e75d928
-
SSDEEP
6144:sVBhrMdgGifB1tMmo5ACS9v0ayh/SnJxLR3g5x865mBC:sVBhQmfa5n7aJm5v5mBC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack003/OFFICIAL PO 1143 FOB QATAR_jpeg.exe
Files
-
0c22d955534174aaffc23beb8b9fcee098a6f450ed1e5ac792a28d866089a035.zip
Password: infected
-
7d835339344a537647f7c90e5922783fa102d16c549c6ca7ffdecc34fac984fb.iso
-
out.iso.iso
-
OFFICIAL PO 1143 FOB QATAR_jpeg.exe.exe windows:6 windows x86 arch:x86
4eb4fa387aa9e72a2c5a5335b8957253
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteConsoleW
CreateFileW
CloseHandle
DecodePointer
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
HeapReAlloc
HeapSize
SetFilePointerEx
VirtualProtect
LCMapStringW
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
CreateThread
Sleep
GetProcessHeap
TerminateThread
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
HeapFree
HeapAlloc
RaiseException
user32
DefWindowProcW
PostQuitMessage
CreateWindowExA
CreateWindowExW
DestroyWindow
EnableWindow
SetForegroundWindow
GetWindowRect
GetWindowTextA
MessageBoxA
GetWindowTextLengthA
UpdateWindow
GetDC
GrayStringA
DispatchMessageW
TranslateMessage
GetMessageW
AppendMenuW
CreateMenu
SetMenu
LoadIconW
RegisterClassW
FillRect
SetWindowTextA
EndPaint
BeginPaint
SendMessageA
GetWindow
SetActiveWindow
SendMessageW
MessageBoxW
gdi32
SetDCPenColor
GetStockObject
SetBkMode
ws2_32
send
closesocket
connect
htons
recv
socket
gethostbyname
WSAStartup
WSACleanup
Sections
.text Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 180B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ