Static task
static1
Behavioral task
behavioral1
Sample
f075f5cae02242fb48c96945932e1fd7bb6a2ecba64899f4c6c193ac276bff06.exe
Resource
win7-20240903-en
General
-
Target
421df1c0c1b0c1b5183630cb9b7b6c7b.bin
-
Size
233KB
-
MD5
23e9cb80f1f3c028acc3084918d10678
-
SHA1
7082f4323e10d6b04777d0e467aea2c7ad49f93c
-
SHA256
4e65038da91e84992041435cc712646cd3c77b312d6021e56024b826701f102d
-
SHA512
de95724a62115d1d2e4e6d2f5f3e7b99b905e547200f819dfad35841e98d4f37aec4ac55a893144dda893e45d9b15e691d148b801d9b3d65cb2e4a8ffa3c7503
-
SSDEEP
6144:8HFVeCXNWn+03FNvFR5sgn/CDZ+zQMKpOloIhN1HQm1:8/hpaF15wpMKUBVJ1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/f075f5cae02242fb48c96945932e1fd7bb6a2ecba64899f4c6c193ac276bff06.exe
Files
-
421df1c0c1b0c1b5183630cb9b7b6c7b.bin.zip
Password: infected
-
f075f5cae02242fb48c96945932e1fd7bb6a2ecba64899f4c6c193ac276bff06.exe.exe windows:5 windows x86 arch:x86
Password: infected
87317682ae27058b5370ec910522f4a0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteVolumeMountPointA
InterlockedIncrement
InterlockedDecrement
SetDefaultCommConfigW
GetEnvironmentStringsW
SetComputerNameW
SetEvent
GetModuleHandleW
SetProcessPriorityBoost
GlobalAlloc
LoadLibraryW
GetFileAttributesA
GetTimeFormatW
GetConsoleAliasW
GetModuleFileNameW
SetLastError
GetProcAddress
UpdateResourceA
LoadLibraryA
Process32Next
GetFileType
AddAtomW
FoldStringW
GetModuleHandleA
SetLocaleInfoW
OpenFileMappingW
BuildCommDCBA
WriteConsoleOutputAttribute
GetVersionExA
WriteProcessMemory
UnregisterWait
GetNumaProcessorNode
SetFileAttributesA
GetCommandLineW
GetLastError
HeapFree
MultiByteToWideChar
HeapAlloc
GetCommandLineA
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
HeapSize
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
SetHandleCount
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
RtlUnwind
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
user32
GetProcessDefaultLayout
gdi32
GetBoundsRect
advapi32
EnumDependentServicesW
Sections
.text Size: 245KB - Virtual size: 245KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 27KB - Virtual size: 3.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ