Static task
static1
Behavioral task
behavioral1
Sample
9446190081232d7d7de3ad599a3376b301e8167abca3935a6ac645cb44ab4a65.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
9446190081232d7d7de3ad599a3376b301e8167abca3935a6ac645cb44ab4a65.exe
Resource
win10v2004-20230221-en
General
-
Target
9446190081232d7d7de3ad599a3376b301e8167abca3935a6ac645cb44ab4a65.zip
-
Size
144KB
-
MD5
9747cf5a495c68a5073142a5f77016a6
-
SHA1
f5f928d5503f50f8a21c1e989b0c653a35300e62
-
SHA256
50dee1b7a8547bd0838937a40ef261c9795a7549f0d38c8507a9a34a736a9e12
-
SHA512
c5ef81a7cfac5f004d12888bfc2515f10614ca9c8737d2a8d761c4334accc42fd81ae733f3ae09c44ccbc8f44423934e677ba9f90fbebc212ab34dc7a3d23284
-
SSDEEP
3072:+s80tSjKugbNhOAmyHMhVOYEeDQsjGj5e+1H4hg:Z8nKHP7mmpYEqEDYhg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/9446190081232d7d7de3ad599a3376b301e8167abca3935a6ac645cb44ab4a65.exe
Files
-
9446190081232d7d7de3ad599a3376b301e8167abca3935a6ac645cb44ab4a65.zip.zip
Password: infected
-
9446190081232d7d7de3ad599a3376b301e8167abca3935a6ac645cb44ab4a65.exe.exe windows x64
Password: infected
7cd0bbb42d4b316f99f5cabd76b4bcaa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetCurrentProcess
CloseHandle
GetCurrentThread
TerminateProcess
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
RtlCaptureContext
ReleaseMutex
WaitForSingleObjectEx
LoadLibraryA
CreateMutexA
RtlLookupFunctionEntry
GetLastError
FormatMessageW
FreeLibrary
GetProcessHeap
HeapFree
HeapAlloc
WaitForSingleObject
ReleaseSRWLockShared
AddVectoredExceptionHandler
SetThreadStackGuarantee
SetLastError
GetCurrentDirectoryW
GetEnvironmentVariableW
SetThreadContext
GetCommandLineW
GetStdHandle
GetCurrentProcessId
QueryPerformanceCounter
TryAcquireSRWLockExclusive
HeapReAlloc
AcquireSRWLockShared
GetModuleHandleW
GetModuleFileNameW
TlsGetValue
TlsSetValue
GetSystemTimeAsFileTime
GetConsoleMode
WriteConsoleW
GetThreadContext
GetSystemInfo
GetProcAddress
GetModuleHandleA
LoadLibraryExW
TlsFree
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
EncodePointer
RaiseException
RtlPcToFileHeader
RtlUnwindEx
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
InitializeSListHead
GetCurrentThreadId
advapi32
RegQueryValueExW
RegOpenKeyExW
SystemFunction036
psapi
EnumProcessModulesEx
GetModuleBaseNameW
user32
GetSystemMetrics
bcrypt
BCryptCloseAlgorithmProvider
BCryptOpenAlgorithmProvider
BCryptGenRandom
api-ms-win-crt-string-l1-1-0
strcpy_s
wcsncmp
api-ms-win-crt-runtime-l1-1-0
terminate
_crt_atexit
_register_onexit_function
_initialize_onexit_table
_seh_filter_exe
_set_app_type
__p___argc
_register_thread_local_exe_atexit_callback
_configure_narrow_argv
_initialize_narrow_environment
_get_initial_narrow_environment
__p___argv
_initterm
_c_exit
_cexit
abort
_initterm_e
_exit
exit
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-stdio-l1-1-0
__p__commode
_set_fmode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-heap-l1-1-0
calloc
malloc
_set_new_mode
free
Sections
.text Size: 188KB - Virtual size: 187KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ