R
Static task
static1
Behavioral task
behavioral1
Sample
aes.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
aes.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
sppgoc.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
sppgoc.exe
Resource
win10v2004-20230221-en
General
-
Target
1.zip
-
Size
2.7MB
-
MD5
07dceec5ee56ce6acf78111de7f46780
-
SHA1
ed128636c690f8c628df9a110c4f21875c78b5c6
-
SHA256
603a4f1afbad5d3c6991330d2ef4e4e3fcfa91a168d252b64c01f956b365ff2a
-
SHA512
63af7478cb2b9e8e2ed859e97ab2534d65613a64be4086a8e85ca2c69d0c3ad685c6f35cb3b2b9589704386f32869f045a4717448415e20ac7e9c811ec288f5e
-
SSDEEP
49152:BkZaVkFFEMCrFrKfwiHVbNo3ogiOzaPQKyk+0BT9RV6Djyg5:SUkFFEvCHVIybT16PV5
Malware Config
Signatures
-
Unsigned PE 4 IoCs
Checks for missing Authenticode signature.
resource unpack001/0.dll unpack001/aes.exe unpack001/app.app unpack001/sppgoc.exe
Files
-
1.zip.zip
Password: infected
-
0.dll.dll windows x64
Password: infected
ae4f601bd069d18ef896035a26897811
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
LoadLibraryW
GetModuleFileNameW
GetProcAddress
WaitForSingleObject
shell32
ShellExecuteExW
ShellExecuteW
shlwapi
PathRemoveFileSpecW
Exports
Exports
Sections
.text Size: 1024B - Virtual size: 547B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 508B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
aes.exe.exe windows x64
Password: infected
0c99c46f83d7c6e522543b07634045ec
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetLastError
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
DeleteFileW
ReadConsoleInputW
SetConsoleMode
GetConsoleMode
GetCommandLineW
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
FindNextFileW
FindFirstFileExW
FindClose
Sleep
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
EncodePointer
RtlUnwindEx
SetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
WriteFile
WideCharToMultiByte
GetConsoleCP
SetHandleCount
GetStdHandle
GetStartupInfoW
DeleteCriticalSection
HeapFree
FlushFileBuffers
MultiByteToWideChar
ReadFile
CloseHandle
CreateFileW
WriteConsoleW
FreeEnvironmentStringsW
GetEnvironmentStringsW
FlsGetValue
FlsSetValue
FlsFree
SetLastError
GetCurrentThreadId
FlsAlloc
HeapSetInformation
GetVersion
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LoadLibraryW
HeapAlloc
HeapReAlloc
SetFilePointer
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
LCMapStringW
GetStringTypeW
SetEndOfFile
GetProcessHeap
advapi32
CryptGenRandom
CryptAcquireContextW
CryptReleaseContext
Sections
.text Size: 79KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
app.app.dll windows x64
Password: infected
9d04aa953d46d52ba4c3125a12154332
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
LoadLibraryW
user32
EnumWindows
advapi32
RegOpenKeyExW
ole32
IIDFromString
iphlpapi
GetInterfaceInfo
msvcrt
_wcsnicmp
psapi
GetMappedFileNameW
shell32
SHGetFolderPathW
Exports
Exports
RHBinder__ShimExeMain
Sections
.text Size: 300KB - Virtual size: 300KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.sedata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
app.app.aes
-
sppgoc.exe.exe windows x64
Password: infected
f8f47a970badb255f8249475e7fbeabb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
ExitProcess
GetCommandLineW
SetFilePointer
lstrlenA
SetErrorMode
FreeLibrary
CreateProcessW
LoadLibraryExW
WaitForSingleObject
QueryActCtxW
WideCharToMultiByte
GetSystemWow64DirectoryW
FormatMessageW
ReadFile
CreateFileW
lstrlenW
Wow64EnableWow64FsRedirection
GetLastError
GetProcAddress
LocalAlloc
HeapSetInformation
CloseHandle
LocalFree
LoadLibraryExA
DelayLoadFailureHook
Sleep
GetStartupInfoW
SetUnhandledExceptionFilter
GetModuleHandleW
QueryPerformanceCounter
GetTickCount
ReleaseActCtx
DeactivateActCtx
CompareStringW
GetFileAttributesW
ActivateActCtx
CreateActCtxW
SearchPathW
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
user32
GetWindow
DefWindowProcW
DestroyWindow
LoadStringW
MessageBoxW
SetWindowLongPtrW
RegisterClassW
CreateWindowExW
GetClassNameW
CharNextW
LoadCursorW
GetWindowLongPtrW
LoadIconW
SetClassLongPtrW
GetClassLongPtrW
msvcrt
?terminate@@YAXXZ
__set_app_type
_fmode
_commode
_amsg_exit
_initterm
_wcmdln
exit
_cexit
_exit
_XcptFilter
__C_specific_handler
__wgetmainargs
iswalpha
_vsnwprintf
_wtoi
wcschr
__setusermatherr
memset
imagehlp
ImageDirectoryEntryToData
ntdll
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
RtlImageNtHeader
NtQueryInformationToken
NtOpenProcessToken
NtClose
NtSetInformationToken
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 444B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ