Static task
static1
Behavioral task
behavioral1
Sample
3dd09fd4260601900a344471ec20765518599ec29a36bd70ec820ec88ab6543c.exe
Resource
win7-20240903-en
General
-
Target
a61ca9bc49c07d5771fdd551d993fd5752d2db1485b10c2667d69f621b9ac579
-
Size
268KB
-
MD5
7139681ca0182861deaaf58bc06a949d
-
SHA1
1c9b845a32e119f4dc713719b12b79f3fad3b67e
-
SHA256
a61ca9bc49c07d5771fdd551d993fd5752d2db1485b10c2667d69f621b9ac579
-
SHA512
0710f97985ef760e49bb6e78d98f701f8b4613061015e8252c147e7b1a92471ccb882782d1f95d034f0487597435f0ce05775238b2b2cfa6ff7d877971ea74e4
-
SSDEEP
6144:idpIJ90YqIw2A2WulLS8O/dNiPd93eVeIbpgIrruuzWT4Ru4lxXBk+ylKHDvxEJL:idpY900nWuQS9u3hrzWL4sKHDxEJL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/3dd09fd4260601900a344471ec20765518599ec29a36bd70ec820ec88ab6543c
Files
-
a61ca9bc49c07d5771fdd551d993fd5752d2db1485b10c2667d69f621b9ac579.zip
Password: infected
-
3dd09fd4260601900a344471ec20765518599ec29a36bd70ec820ec88ab6543c.exe windows:6 windows x86 arch:x86
a57bcbf302bad83a90d00f7b978eade0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
GetProcessHeap
LoadLibraryA
GetConsoleWindow
ReadConsoleInputA
PeekConsoleInputA
GetNumberOfConsoleInputEvents
SetEndOfFile
SetEnvironmentVariableA
CreateFileW
GetFileAttributesExW
CreateProcessA
GetExitCodeProcess
WaitForSingleObject
GetStringTypeW
EnumSystemLocalesEx
IsValidLocaleName
LCMapStringEx
GetUserDefaultLocaleName
GetLocaleInfoEx
CompareStringEx
GetDateFormatEx
GetTimeFormatEx
HeapSize
LoadLibraryW
OutputDebugStringW
WriteConsoleW
SetFilePointerEx
IsDebuggerPresent
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
GetLastError
AreFileApisANSI
MultiByteToWideChar
EncodePointer
DecodePointer
InterlockedDecrement
ExitProcess
GetModuleHandleExW
GetProcAddress
GetCommandLineA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetCurrentProcess
TerminateProcess
GetStartupInfoW
GetModuleHandleW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
FatalAppExitA
HeapFree
Sleep
CloseHandle
FlushFileBuffers
GetStdHandle
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetFileType
InitOnceExecuteOnce
RtlUnwind
ReadFile
ReadConsoleW
SetFilePointer
DeleteFileW
MoveFileExW
GetModuleFileNameW
InterlockedExchange
FreeLibrary
LoadLibraryExW
SetConsoleCtrlHandler
InterlockedIncrement
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
SetLastError
GetCurrentThread
GetCurrentThreadId
GetModuleFileNameA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetTickCount64
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapReAlloc
SetStdHandle
SetConsoleMode
rtutils
RouterLogEventA
TraceVprintfExW
MprSetupProtocolEnum
RouterLogDeregisterA
RouterLogRegisterW
TraceDeregisterW
wininet
FtpPutFileA
FindNextUrlCacheContainerW
FtpDeleteFileA
FtpRenameFileA
urlmon
HlinkNavigateString
GetClassURL
mswsock
GetAddressByNameA
SetServiceA
AcceptEx
loadperf
UnloadPerfCounterTextStringsW
UnloadPerfCounterTextStringsA
user32
ShowWindow
Sections
.text Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 179KB - Virtual size: 179KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ