Static task
static1
Behavioral task
behavioral1
Sample
a0aa24228552ce2538483b0299013f2d335ab91e6c81b86cd0d643c89bec58ee.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a0aa24228552ce2538483b0299013f2d335ab91e6c81b86cd0d643c89bec58ee.exe
Resource
win10v2004-20230220-en
General
-
Target
a0aa24228552ce2538483b0299013f2d335ab91e6c81b86cd0d643c89bec58ee.zip
-
Size
26KB
-
MD5
432593a0e778556c4dbb1753a83aca76
-
SHA1
9b8db332e6df6bc66522524bf002cd80c4e75492
-
SHA256
b3811f21ba1713ac4e80d738010620ab1b3f85d3e41ade6bb615f7290853795b
-
SHA512
71a452b6b23ae68773a0d944cd41f610828e1e7c871434ba812e03726f5525fc3aed849f8c1cd535eb3623f8c6f95c38c1c2cac9d39a5584618f1069ef9831e1
-
SSDEEP
768:UoghZRIYOGmaYPCAaQroMGBUKbFholwlt/DozRtDrrk:UoqIYAHIQo7bFiwwFBrA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/a0aa24228552ce2538483b0299013f2d335ab91e6c81b86cd0d643c89bec58ee.exe
Files
-
a0aa24228552ce2538483b0299013f2d335ab91e6c81b86cd0d643c89bec58ee.zip.zip
Password: infected
-
a0aa24228552ce2538483b0299013f2d335ab91e6c81b86cd0d643c89bec58ee.exe.exe windows x64
Password: infected
10df48356defd9056d7e2f19500019aa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
GetTokenInformation
SetSecurityDescriptorGroup
OpenThreadToken
AddAccessAllowedAce
GetLengthSid
RegDeleteValueW
RegOpenKeyExW
InitializeAcl
InitializeSecurityDescriptor
UnregisterTraceGuids
RegisterTraceGuidsW
OpenProcessToken
GetTraceEnableLevel
AddAce
RegSetValueExW
IsValidSid
GetTraceEnableFlags
RegEnumKeyExW
GetTraceLoggerHandle
ConvertStringSidToSidW
CopySid
TraceMessage
RegCreateKeyExW
GetAce
SetSecurityDescriptorOwner
RegQueryInfoKeyW
GetAclInformation
RegCloseKey
SetSecurityDescriptorDacl
CloseServiceHandle
OpenSCManagerW
AllocateAndInitializeSid
FreeSid
QueryServiceStatus
StartServiceW
OpenServiceW
kernel32
WaitForSingleObject
GetCurrentThreadId
CreateEventW
MultiByteToWideChar
Sleep
GetLastError
SetEvent
GetCurrentThread
CloseHandle
RaiseException
CreateThread
HeapSetInformation
FindResourceExW
LoadResource
GetProcAddress
LocalFree
DeleteCriticalSection
GetProcessHeap
GetModuleHandleW
FreeLibrary
lstrcmpiW
LoadLibraryExW
LeaveCriticalSection
GetModuleFileNameW
GetCommandLineW
EnterCriticalSection
SizeofResource
InitializeCriticalSection
GetCurrentProcess
HeapAlloc
HeapFree
OutputDebugStringA
GetTickCount
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetStartupInfoW
user32
CharNextW
DispatchMessageW
CharUpperW
TranslateMessage
UnregisterClassA
PostThreadMessageW
GetMessageW
msvcrt
_fmode
__setusermatherr
_exit
exit
__set_app_type
_commode
_amsg_exit
_XcptFilter
_callnewh
_purecall
wcsncat_s
wcsncpy_s
malloc
free
wcscat_s
wcscpy_s
memcpy_s
__C_specific_handler
_errno
realloc
_lock
_unlock
_wcmdln
__wgetmainargs
__dllonexit
_onexit
?terminate@@YAXXZ
memcmp
_initterm
_cexit
memset
userenv
ExpandEnvironmentStringsForUserW
oleaut32
SysAllocString
SysStringLen
VarUI4FromStr
SysFreeString
UnRegisterTypeLi
RegisterTypeLi
VariantInit
VariantClear
LoadRegTypeLi
LoadTypeLi
SysStringByteLen
shell32
ShellExecuteExW
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationW
api-ms-win-core-com-l1-1-0
CoSuspendClassObjects
CoResumeClassObjects
CoInitializeEx
CoRevokeClassObject
CoRegisterClassObject
CoTaskMemRealloc
CoInitializeSecurity
CoTaskMemAlloc
StringFromGUID2
CoUninitialize
CoTaskMemFree
CoCreateInstance
rpcrt4
RpcStringFreeW
RpcBindingSetAuthInfoExW
RpcStringBindingComposeW
RpcBindingFromStringBindingW
NdrClientCall3
RpcBindingFree
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 412B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ