Overview
overview
7Static
static
1MessinesBr...ce.wsf
windows7-x64
3MessinesBr...ce.wsf
windows10-2004-x64
7abrogative...ns.lnk
windows7-x64
3abrogative...ns.lnk
windows10-2004-x64
3prepolice/...ed.exe
windows7-x64
prepolice/...ed.exe
windows10-2004-x64
1prepolice/...ey.cmd
windows7-x64
3prepolice/...ey.cmd
windows10-2004-x64
7prepolice/...ss.jpg
windows7-x64
3prepolice/...ss.jpg
windows10-2004-x64
3Static task
static1
Behavioral task
behavioral1
Sample
MessinesBroggle/Practice.wsf
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
MessinesBroggle/Practice.wsf
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
abrogativeBotulins.lnk
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
abrogativeBotulins.lnk
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
prepolice/Ptomatropine/AccentedPecked/Unchangefully/BaldberryConvinced.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
prepolice/Ptomatropine/AccentedPecked/Unchangefully/BaldberryConvinced.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral7
Sample
prepolice/Ptomatropine/AccentedPecked/pigsney.cmd
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
prepolice/Ptomatropine/AccentedPecked/pigsney.cmd
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
prepolice/capaciousness.jpg
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
prepolice/capaciousness.jpg
Resource
win10v2004-20230220-en
General
-
Target
52f43f65936b528349c16e7054072c1e.bin
-
Size
350KB
-
MD5
c8c8db678df28af7f58ab6d20397e1e3
-
SHA1
51a562fcff02f97b6ec6ba6ce7f2c7c33b96bba7
-
SHA256
7d47a48cf6aa0f78edc6fb4e595cb49dd372a5997aee15156b38fe3ad126e962
-
SHA512
47cc82f927e56b976733b18a5d8fa98c6ed89ab439281893b35d47eb737a95c2cdb3651b05069adcbd4822642b9e8e13049dd98d009d46af27fc059aef4ff8d9
-
SSDEEP
6144:8oaGMBQFPXEgUGnBXnvh8zj/alNFoI2qU3Pcx+27GB/PxzFUDdPNNkth6ss:5MBQxUaBXWT9/9kx+YGppaBTkC
Malware Config
Signatures
Files
-
52f43f65936b528349c16e7054072c1e.bin.zip
Password: infected
-
1713afb7ab14438e57b0e79bc8d3bae60cc68363acaaace0db90adcc17204cf4.img.iso
Password: infected
-
MessinesBroggle/Practice.wsf
-
MessinesBroggle/outsweeping.VEs
-
MessinesBroggle/phoenicitePhotohyponasty/NoncoinageCircumstantialities/bisayanMulaprakriti/tritonalitySinned.etR
-
abrogativeBotulins.lnk.lnk
-
prepolice/Matralia.AnxT
-
prepolice/Ptomatropine/AccentedPecked/Unchangefully/BaldberryConvinced.exe.exe windows x64
Password: infected
272245e2988e1e430500b852c4fb5e18
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_setmode
exit
iswxdigit
time
srand
_wtol
fflush
wcsstr
iswalpha
wcstoul
_errno
printf
rand
fprintf
wcsncmp
_pipe
_commode
_lock
wcsrchr
realloc
towlower
_initterm
__setusermatherr
setlocale
_wcsupr
iswdigit
_ultoa
_cexit
_unlock
_exit
__dllonexit
_wcsicmp
iswspace
wcschr
fgets
??_V@YAXPEAX@Z
_pclose
ferror
_onexit
__CxxFrameHandler3
_open_osfhandle
_close
feof
_dup
_wpopen
_wcsnicmp
?terminate@@YAXXZ
memset
wcstol
_get_osfhandle
_dup2
_getch
towupper
memcmp
_setjmp
wcsspn
_fmode
qsort
__set_app_type
_tell
_wcslwr
longjmp
_local_unwind
_purecall
__C_specific_handler
??3@YAXPEAX@Z
memcpy_s
free
calloc
__getmainargs
_XcptFilter
_amsg_exit
??1type_info@@UEAA@XZ
memmove
memcpy
_CxxThrowException
_vsnwprintf
swscanf
__iob_func
malloc
_callnewh
??0exception@@QEAA@AEBQEBD@Z
??0exception@@QEAA@AEBQEBDH@Z
??0exception@@QEAA@AEBV0@@Z
??1exception@@UEAA@XZ
?what@exception@@UEBAPEBDXZ
wcscmp
ntdll
RtlLookupFunctionEntry
RtlCaptureContext
NtOpenProcessToken
NtQueryInformationToken
NtClose
NtOpenThreadToken
RtlFreeHeap
NtFsControlFile
RtlDosPathNameToNtPathName_U
RtlVirtualUnwind
RtlFreeUnicodeString
RtlReleaseRelativeName
NtOpenFile
RtlDosPathNameToRelativeNtPathName_U_WithStatus
NtSetInformationFile
NtQueryVolumeInformationFile
NtSetInformationProcess
NtQueryInformationProcess
RtlNtStatusToDosError
NtCancelSynchronousIoFile
RtlCreateUnicodeStringFromAsciiz
RtlFindLeastSignificantBit
api-ms-win-core-kernel32-legacy-l1-1-0
CopyFileW
GetConsoleWindow
api-ms-win-core-libraryloader-l1-2-0
GetModuleHandleW
GetModuleFileNameA
LoadLibraryExW
GetProcAddress
GetModuleFileNameW
GetModuleHandleExW
api-ms-win-core-synch-l1-1-0
CreateSemaphoreExW
InitializeCriticalSection
WaitForSingleObject
ReleaseSemaphore
TryAcquireSRWLockExclusive
WaitForSingleObjectEx
ReleaseMutex
ReleaseSRWLockShared
AcquireSRWLockShared
LeaveCriticalSection
CreateMutexExW
EnterCriticalSection
ReleaseSRWLockExclusive
OpenSemaphoreW
api-ms-win-core-heap-l1-1-0
HeapFree
HeapAlloc
GetProcessHeap
HeapSetInformation
HeapReAlloc
HeapSize
api-ms-win-core-errorhandling-l1-1-0
SetLastError
UnhandledExceptionFilter
GetLastError
SetErrorMode
SetUnhandledExceptionFilter
api-ms-win-core-processthreads-l1-1-0
InitializeProcThreadAttributeList
GetCurrentThreadId
UpdateProcThreadAttribute
DeleteProcThreadAttributeList
GetStartupInfoW
CreateProcessAsUserW
OpenThread
CreateProcessW
ResumeThread
TerminateProcess
GetExitCodeProcess
GetCurrentProcess
GetCurrentProcessId
api-ms-win-core-localization-l1-2-0
GetThreadLocale
SetThreadLocale
FormatMessageW
GetLocaleInfoW
GetCPInfo
GetACP
GetUserDefaultLCID
api-ms-win-core-debug-l1-1-0
OutputDebugStringW
DebugBreak
IsDebuggerPresent
api-ms-win-core-handle-l1-1-0
DuplicateHandle
CloseHandle
api-ms-win-core-memory-l1-1-0
VirtualAlloc
VirtualQuery
VirtualFree
ReadProcessMemory
api-ms-win-core-console-l1-1-0
ReadConsoleW
SetConsoleCtrlHandler
SetConsoleMode
WriteConsoleW
GetConsoleMode
GetConsoleOutputCP
api-ms-win-core-file-l1-1-0
CreateFileW
FlushFileBuffers
GetFileAttributesExW
GetDriveTypeW
FindClose
FindNextFileW
CreateDirectoryW
GetVolumeInformationW
SetFileAttributesW
SetEndOfFile
SetFilePointerEx
WriteFile
DeleteFileW
SetFileTime
GetVolumePathNameW
SetFilePointer
ReadFile
GetFileAttributesW
GetFileType
RemoveDirectoryW
FindFirstFileExW
CompareFileTime
GetFullPathNameW
GetDiskFreeSpaceExW
FileTimeToLocalFileTime
GetFileSize
FindFirstFileW
api-ms-win-core-string-l1-1-0
WideCharToMultiByte
MultiByteToWideChar
api-ms-win-core-processenvironment-l1-1-0
GetCommandLineW
GetEnvironmentStringsW
ExpandEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SearchPathW
SetCurrentDirectoryW
GetCurrentDirectoryW
GetEnvironmentVariableW
SetEnvironmentStringsW
GetStdHandle
api-ms-win-core-console-l2-1-0
SetConsoleCursorPosition
GetConsoleScreenBufferInfo
ScrollConsoleScreenBufferW
FillConsoleOutputAttribute
FillConsoleOutputCharacterW
FlushConsoleInputBuffer
SetConsoleTextAttribute
api-ms-win-security-base-l1-1-0
GetFileSecurityW
RevertToSelf
GetSecurityDescriptorOwner
api-ms-win-core-sysinfo-l1-1-0
GetSystemTime
SetLocalTime
GetSystemTimeAsFileTime
GetTickCount
GetWindowsDirectoryW
GetLocalTime
GetVersion
api-ms-win-core-timezone-l1-1-0
SystemTimeToFileTime
FileTimeToSystemTime
api-ms-win-core-datetime-l1-1-0
GetDateFormatW
GetTimeFormatW
api-ms-win-core-systemtopology-l1-1-0
GetNumaNodeProcessorMaskEx
GetNumaHighestNodeNumber
api-ms-win-core-console-l2-2-0
SetConsoleTitleW
GetConsoleTitleW
api-ms-win-core-processenvironment-l1-2-0
NeedCurrentDirectoryForExePathW
api-ms-win-core-registry-l1-1-0
RegCloseKey
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegEnumKeyExW
RegDeleteKeyExW
RegDeleteValueW
RegQueryValueExW
api-ms-win-core-file-l2-1-0
MoveFileExW
CreateSymbolicLinkW
CreateHardLinkW
MoveFileWithProgressW
GetFileInformationByHandleEx
api-ms-win-core-heap-l2-1-0
GlobalAlloc
GlobalFree
LocalFree
api-ms-win-core-io-l1-1-0
DeviceIoControl
api-ms-win-core-winrt-l1-1-0
RoInitialize
RoUninitialize
api-ms-win-core-processtopology-l1-1-0
GetThreadGroupAffinity
api-ms-win-core-synch-l1-2-0
Sleep
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-string-obsolete-l1-1-0
lstrcmpW
lstrcmpiW
api-ms-win-core-processtopology-obsolete-l1-1-0
SetProcessAffinityMask
api-ms-win-core-apiquery-l1-1-0
ApiSetQueryApiSetPresence
api-ms-win-core-delayload-l1-1-1
ResolveDelayLoadedAPI
api-ms-win-core-delayload-l1-1-0
DelayLoadFailureHook
Sections
.text Size: 196KB - Virtual size: 195KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 512B - Virtual size: 144B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 780B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
prepolice/Ptomatropine/AccentedPecked/Unchangefully/erubesciteHelsingkite.info
-
prepolice/Ptomatropine/AccentedPecked/pigsney.cmd.cmd .vbs
-
prepolice/Ptomatropine/AccentedPecked/preestimateMonsieurship.WN
-
prepolice/Ptomatropine/AccentedPecked/reconnoitrer.dat
-
prepolice/capaciousness.jpeg.jpg
-
prepolice/nonmoralMilkshed.dat