Static task
static1
Behavioral task
behavioral1
Sample
Device/HarddiskVolume2/F DRIVE FILES/Data E Drive/Data D Drive/C Drive/Dil/Miscellaneous/Google Earth/Games/DinerDashSetup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Device/HarddiskVolume2/F DRIVE FILES/Data E Drive/Data D Drive/C Drive/Dil/Miscellaneous/Google Earth/Games/DinerDashSetup.exe
Resource
win10v2004-20230220-en
General
-
Target
DinerDashSetup.exe
-
Size
8.6MB
-
MD5
610c40cd14cd4c0d8add50d514aee772
-
SHA1
7e187ec0d7499472c420b9acf8502bc2b4970051
-
SHA256
f0d4a0b56ba9fdd65f8de813bb1eec4f4f930c4fe81ad4a835f7814851afc6c1
-
SHA512
5fd75261c7eca937a26fcd0da2a4423553032f09a945c988124aa7bac93f99f2ea2bff4f3c59ad65e40561025c2bb22a7eb935f9daed1442d0046595d2841e57
-
SSDEEP
196608:KRNEXxia9uWXWWkhajTVOAsOLbTztS71REPiWZpbmFYMx1IqRVLw3Lg3Jlzjp+5H:4O39WWkG9Tzw712PiWHZu1IqRVLw7gny
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Device/HarddiskVolume2/F DRIVE FILES/Data E Drive/Data D Drive/C Drive/Dil/Miscellaneous/Google Earth/Games/DinerDashSetup.exe
Files
-
DinerDashSetup.exe.zip
Password: S@ndb0x!2023@@
-
Device/HarddiskVolume2/F DRIVE FILES/Data E Drive/Data D Drive/C Drive/Dil/Miscellaneous/Google Earth/Games/DinerDashSetup.exe.exe windows x86
Password: S@ndb0x!2023@@
ef18a895316516821d32301f197c09dc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStringTypeW
GlobalFree
SetUnhandledExceptionFilter
IsBadCodePtr
GetCPInfo
GetACP
GetOEMCP
LoadLibraryA
CompareStringA
CompareStringW
SetEnvironmentVariableA
GlobalReAlloc
Sleep
GetTempPathA
GetStringTypeA
LocalAlloc
LocalFree
GlobalAlloc
GlobalLock
VirtualAlloc
GlobalUnlock
LCMapStringW
LCMapStringA
GetTickCount
GetModuleFileNameA
CreateProcessA
GetExitCodeProcess
IsBadReadPtr
IsBadWritePtr
CloseHandle
FileTimeToDosDateTime
GetSystemTimeAsFileTime
FindClose
FindFirstFileA
GetFileAttributesA
CreateDirectoryA
CreateFileA
GetVersion
SetFileAttributesA
RtlUnwind
ExitProcess
TerminateProcess
GetCurrentProcess
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetLastError
DeleteFileA
SetEndOfFile
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcAddress
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
FlushFileBuffers
ReadFile
SetFilePointer
SetStdHandle
MultiByteToWideChar
user32
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
SetWindowPos
SendMessageA
InvalidateRect
PeekMessageA
TranslateMessage
DispatchMessageA
DefWindowProcA
BeginPaint
EndPaint
PostQuitMessage
ShowWindow
GetDesktopWindow
SetForegroundWindow
SetCursor
GetActiveWindow
MessageBoxA
GetDC
ReleaseDC
gdi32
CreateDIBitmap
CreateDIBSection
GetStockObject
GetObjectA
GetDeviceCaps
SelectObject
CreateCompatibleDC
GetMapMode
SetMapMode
DPtoLP
BitBlt
DeleteDC
CreateSolidBrush
PatBlt
DeleteObject
SelectPalette
RealizePalette
CreatePalette
advapi32
RegQueryValueExA
RegCreateKeyA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
Sections
.text Size: 143KB - Virtual size: 142KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 25KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gda Size: - Virtual size: 1B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
manifest.json