Static task
static1
Behavioral task
behavioral1
Sample
249658063881bcc13f2b21919906d68272dff1348251a2a1cb77abaf0eaf0c3d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
249658063881bcc13f2b21919906d68272dff1348251a2a1cb77abaf0eaf0c3d.exe
Resource
win10v2004-20241007-en
General
-
Target
249658063881bcc13f2b21919906d68272dff1348251a2a1cb77abaf0eaf0c3d.zip
-
Size
1.2MB
-
MD5
8225ba2c90fada8b9b26cdbbad2f471b
-
SHA1
0c11c37bb58a2682302b0d9cfd9c2e9d753c55d4
-
SHA256
8e8d12f2cc2ebbbb38b83946259b3e67f381be00d4a560f27076d6baa021f339
-
SHA512
f11580ecbde059e642ef098852f26611ae28e18ee5583e840182aa41fe40154965d9a71cae59c3a78cb10d1ed362ca53d196156bf4551ede00d6a2f07ce1a09f
-
SSDEEP
24576:z+nXS0Fvo9GR1WLAdNdNtAvVBA0RsX+uLMgPc1lOO:z+nXS0FvoQLWLA9004xuLtg8O
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/249658063881bcc13f2b21919906d68272dff1348251a2a1cb77abaf0eaf0c3d.exe
Files
-
249658063881bcc13f2b21919906d68272dff1348251a2a1cb77abaf0eaf0c3d.zip.zip
Password: infected
-
249658063881bcc13f2b21919906d68272dff1348251a2a1cb77abaf0eaf0c3d.exe.exe windows:6 windows x86 arch:x86
2716f32d1d63b3fc977d6064633b778d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AcquireSRWLockExclusive
CloseHandle
CompareStringW
CreateFileW
CreateThread
DecodePointer
DeleteCriticalSection
EncodePointer
EnterCriticalSection
ExitProcess
ExitThread
FindClose
FindFirstFileExW
FindNextFileW
FlushFileBuffers
FreeEnvironmentStringsW
FreeLibrary
FreeLibraryAndExitThread
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleMode
GetConsoleOutputCP
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStringsW
GetExitCodeThread
GetFileSize
GetFileType
GetLastError
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleExW
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSectionAndSpinCount
InitializeSListHead
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
LCMapStringW
LeaveCriticalSection
LoadLibraryExW
MultiByteToWideChar
QueryPerformanceCounter
RaiseException
ReadFile
ReleaseSRWLockExclusive
RtlUnwind
SetEnvironmentVariableW
SetFilePointerEx
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
TryAcquireSRWLockExclusive
UnhandledExceptionFilter
WaitForSingleObjectEx
WakeAllConditionVariable
WideCharToMultiByte
WriteConsoleW
WriteFile
Sections
.text Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.OO Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 232B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.bss Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE