Static task
static1
Behavioral task
behavioral1
Sample
77bc9e1c6ed525c2a517635600855407e05a44d1410ef4a26140192a28e476ce.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
77bc9e1c6ed525c2a517635600855407e05a44d1410ef4a26140192a28e476ce.exe
Resource
win10v2004-20241007-en
General
-
Target
e7ab9bade805055ba06243ba8123934608aa7b35e13fc823b8f88bc42c74ebd5
-
Size
400KB
-
MD5
6b3ea5eee8c2ffc1c6f014f0865cfbf1
-
SHA1
c5ab9745b98e94c6608f19c37565c7f1cc32a984
-
SHA256
e7ab9bade805055ba06243ba8123934608aa7b35e13fc823b8f88bc42c74ebd5
-
SHA512
f4a71d6e54d1797186ddcddf0156d153f1487463a803f0a3eed333b566d3acf013b9545410dbe49d6d4c358049068b3db7a27a3a2865d17ee33bfe28239a5c3f
-
SSDEEP
12288:KAY+B5VzjDhb3WQ8PW+VupG8v+mG2LL5W9slgad:3Y+BHxbh+V/mGsL5eQn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/77bc9e1c6ed525c2a517635600855407e05a44d1410ef4a26140192a28e476ce
Files
-
e7ab9bade805055ba06243ba8123934608aa7b35e13fc823b8f88bc42c74ebd5.zip
Password: infected
-
77bc9e1c6ed525c2a517635600855407e05a44d1410ef4a26140192a28e476ce.exe windows:6 windows x86 arch:x86
49be0836dac021f86af2cb207b4613c8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OutputDebugStringW
FormatMessageW
VirtualProtect
HeapSize
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
SetFilePointerEx
GetFileSizeEx
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetProcessHeap
WriteFile
ExitProcess
HeapReAlloc
HeapFree
HeapAlloc
WriteConsoleW
GetModuleHandleExW
GetModuleFileNameW
GetFileType
GetStdHandle
LoadLibraryExW
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
LCMapStringW
GetCPInfo
CloseHandle
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RaiseException
RtlUnwind
GetLastError
FreeLibrary
CreateFileW
user32
GrayStringA
GetDC
TranslateMessage
DispatchMessageW
PeekMessageW
DefWindowProcW
PostQuitMessage
UnregisterClassW
RegisterClassExW
CreateWindowExW
ShowWindow
SetCapture
ReleaseCapture
LoadImageW
LoadCursorW
SetWindowLongW
GetWindowLongW
AdjustWindowRect
UpdateWindow
d3d11
D3D11CreateDeviceAndSwapChain
gdiplus
GdiplusStartup
GdiplusShutdown
Sections
.text Size: 210KB - Virtual size: 210KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 258KB - Virtual size: 258KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 336B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 165KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ