Static task
static1
Behavioral task
behavioral1
Sample
5d6e4bd7bd7239fab20e043fb292974497297af89759b1b0d48d7d006e5e96fa.exe
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
5d6e4bd7bd7239fab20e043fb292974497297af89759b1b0d48d7d006e5e96fa.exe
Resource
win7-20230220-en
General
-
Target
Avos2.zip
-
Size
371KB
-
MD5
c9f97820c06f85a39359d97489379925
-
SHA1
631206da423a9f5a5b973831e1c7efb84c8e493e
-
SHA256
1198fb9117776809b11a19000161377384957bee846f7b25a610fc8ca082eb37
-
SHA512
a18c9bdea81b2076e6eda79a72aff0fb4cd4b94e76cd0471f0d4c29920d71ec89d6dca0a93cc3b197121ccc9d8d592a53a6abcda523464c7c949d4ad9b1a9c99
-
SSDEEP
6144:PgbXn1IPkVEerYs94ZmfIOkTJcd/SV16n0Kbfm3b2iM5hoiaquJxv+H:oD1fVjSqkV163ab2iIFaRv+H
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/5d6e4bd7bd7239fab20e043fb292974497297af89759b1b0d48d7d006e5e96fa
Files
-
Avos2.zip.zip
Password: infected1
-
5d6e4bd7bd7239fab20e043fb292974497297af89759b1b0d48d7d006e5e96fa.exe windows x86
Password: infected1
6384241afa3b18e8b84aff69eaa01910
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FormatMessageA
FindNextVolumeW
CreateIoCompletionPort
GetDriveTypeW
GetVolumePathNamesForVolumeNameW
ResetEvent
GetConsoleWindow
CopyFileW
FindVolumeClose
ExitProcess
LocalFree
SetVolumeMountPointW
CloseHandle
Process32Next
GlobalAlloc
GetLastError
Sleep
CreateToolhelp32Snapshot
SetFileAttributesW
PostQueuedCompletionStatus
GetFileAttributesW
CreateMutexA
GetQueuedCompletionStatus
SetThreadPriority
SetEvent
WriteConsoleW
CreateFileW
Wow64DisableWow64FsRedirection
lstrlenW
GetCurrentProcess
FindFirstVolumeW
Process32First
GetFileSizeEx
HeapSize
GetTimeZoneInformation
ReadConsoleW
SetFilePointerEx
ReadFile
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
SetStdHandle
InitializeSListHead
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
MultiByteToWideChar
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
TryEnterCriticalSection
DeleteCriticalSection
WideCharToMultiByte
WaitForSingleObjectEx
GetExitCodeThread
LCMapStringEx
EncodePointer
DecodePointer
QueryPerformanceFrequency
GetProcAddress
CompareStringEx
GetCPInfo
GetLocaleInfoEx
GetStringTypeW
SetLastError
RtlUnwind
InterlockedPushEntrySList
RaiseException
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetModuleHandleExW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleFileNameW
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
HeapFree
HeapAlloc
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
HeapReAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
CreateEventW
advapi32
CryptDestroyKey
CryptImportKey
FreeSid
OpenProcessToken
SetNamedSecurityInfoW
LookupPrivilegeValueA
AllocateAndInitializeSid
CryptEncrypt
CryptReleaseContext
SetEntriesInAclA
AdjustTokenPrivileges
CryptAcquireContextA
CryptGenRandom
user32
ShutdownBlockReasonCreate
ShowWindow
crypt32
CryptStringToBinaryA
CryptBinaryToStringA
CryptDecodeObjectEx
CryptImportPublicKeyInfo
rstrtmgr
RmGetList
RmRegisterResources
RmStartSession
RmEndSession
mpr
WNetOpenEnumA
WNetCloseEnum
WNetAddConnection2A
WNetEnumResourceA
Sections
.text Size: 622KB - Virtual size: 621KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ