Static task
static1
Behavioral task
behavioral1
Sample
c6e5a9f39bfc6dc46c2eb7a786948e9d111ddbec5e157c8081f7c22b7d6b3c78.exe
Resource
win10v2004-20241007-en
General
-
Target
c6e5a9f39bfc6dc46c2eb7a786948e9d111ddbec5e157c8081f7c22b7d6b3c78.zip
-
Size
168KB
-
MD5
7cd7674bcc4460deea815b10127e8e14
-
SHA1
72c88131f1160190fb0311c3d5ce7b1300c860c5
-
SHA256
192a20e5740cf683ec11f991532c652085502809370987ce5cd37aab99034fa9
-
SHA512
a758c19abf5af4c048e6eb802e4d1cfe8de4f9d92c2f3d744a0ea5550489a4af65fec3c0d15af7a4ec39a79e13af1e8f22c32c367be5e6d55299381498271bc0
-
SSDEEP
3072:4zZfVx5N/yiQMbWOQpw3gjktELtbQEtZk/hn350KfiDXzcVpJpd8W4h4PvaEX:4zvN/nJbWbEmiLEEhp0KaDXzkJpdD4mr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/c6e5a9f39bfc6dc46c2eb7a786948e9d111ddbec5e157c8081f7c22b7d6b3c78.exe
Files
-
c6e5a9f39bfc6dc46c2eb7a786948e9d111ddbec5e157c8081f7c22b7d6b3c78.zip.zip
Password: infected
-
c6e5a9f39bfc6dc46c2eb7a786948e9d111ddbec5e157c8081f7c22b7d6b3c78.exe.exe windows:5 windows x86 arch:x86
d824fb8d6324dfb7bc7592dceba22edb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CommConfigDialogA
SetEndOfFile
ZombifyActCtx
SetDefaultCommConfigW
SetEvent
GetModuleHandleW
GetProcessHeap
GetWindowsDirectoryA
WaitNamedPipeW
FindActCtxSectionStringA
GetConsoleCP
GlobalAlloc
GetCalendarInfoW
lstrcpynW
GetFileAttributesW
SetSystemPowerState
GetACP
lstrlenW
AllocConsole
GetProcAddress
GetProcessHeaps
BuildCommDCBAndTimeoutsW
HeapLock
HeapWalk
GetModuleFileNameA
CreateMutexA
GetConsoleTitleW
VirtualProtect
ReleaseMutex
SetFileShortNameA
GetPrivateProfileSectionW
WriteProcessMemory
LCMapStringW
DeleteFileA
CloseHandle
CreateFileW
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
GetLastError
HeapFree
GetCommandLineA
RaiseException
RtlUnwind
HeapAlloc
GetCPInfo
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
IsDebuggerPresent
ExitProcess
GetModuleHandleExW
HeapSize
GetCurrentThreadId
GetStdHandle
GetFileType
WriteFile
GetModuleFileNameW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsValidCodePage
GetOEMCP
HeapReAlloc
GetConsoleMode
SetFilePointerEx
LoadLibraryExW
OutputDebugStringW
SetStdHandle
WriteConsoleW
FlushFileBuffers
user32
GetCaretPos
advapi32
DeregisterEventSource
Sections
.text Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 107KB - Virtual size: 8.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ