Static task
static1
Behavioral task
behavioral1
Sample
31ebf7219722b8c908a914b2b08c5d03140af8b0cef6c96152e458dc82301c0a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
31ebf7219722b8c908a914b2b08c5d03140af8b0cef6c96152e458dc82301c0a.exe
Resource
win10v2004-20241007-en
General
-
Target
c401a019b5a9e44646577f8922e1014e.bin
-
Size
1.2MB
-
MD5
a2b941736a2ce18907f6cda6d49b1b14
-
SHA1
eec7a607333e567b6c2418c413e681ec99b57201
-
SHA256
4e3ae21557c07e2c3b30040df6078be5a8276163f52166954cbbdd4f14321488
-
SHA512
1ab1d0961eb6cd983f8740251e7678122a41d9fad477901654844350e6530d0a6252b31893fe33c7e7b0976fd32e1be356e2821d95d59e0bceaf9106e5f024f9
-
SSDEEP
24576:g9R704mCsJlR5iH/tgx9wj60dvy8V32LFV3IuaS4IPEV9jty3sqw:g9FeCsl/MF49sNUbLFxRTe95yy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/31ebf7219722b8c908a914b2b08c5d03140af8b0cef6c96152e458dc82301c0a.exe
Files
-
c401a019b5a9e44646577f8922e1014e.bin.zip
Password: infected
-
31ebf7219722b8c908a914b2b08c5d03140af8b0cef6c96152e458dc82301c0a.exe.exe windows:6 windows x86 arch:x86
Password: infected
2716f32d1d63b3fc977d6064633b778d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AcquireSRWLockExclusive
CloseHandle
CompareStringW
CreateFileW
CreateThread
DecodePointer
DeleteCriticalSection
EncodePointer
EnterCriticalSection
ExitProcess
ExitThread
FindClose
FindFirstFileExW
FindNextFileW
FlushFileBuffers
FreeEnvironmentStringsW
FreeLibrary
FreeLibraryAndExitThread
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleMode
GetConsoleOutputCP
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStringsW
GetExitCodeThread
GetFileSize
GetFileType
GetLastError
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleExW
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSectionAndSpinCount
InitializeSListHead
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
LCMapStringW
LeaveCriticalSection
LoadLibraryExW
MultiByteToWideChar
QueryPerformanceCounter
RaiseException
ReadFile
ReleaseSRWLockExclusive
RtlUnwind
SetEnvironmentVariableW
SetFilePointerEx
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
TryAcquireSRWLockExclusive
UnhandledExceptionFilter
WaitForSingleObjectEx
WakeAllConditionVariable
WideCharToMultiByte
WriteConsoleW
WriteFile
Sections
.text Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.OO Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 232B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.bss Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE