Static task
static1
Behavioral task
behavioral1
Sample
pkunzip.exe
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
pkunzip.exe
Resource
win7-20230220-en
General
-
Target
6639750d43d572f9d80a023a738c5974.zip
-
Size
30KB
-
MD5
2f36c51c390bf2a29a18ef56bda96b00
-
SHA1
3c55359f089c9ba9815f801cb56edec86c17a57c
-
SHA256
db76429383532a5ed6c83247f245e9fdcb619a0de3c65edfb383e6595fef9ea5
-
SHA512
ce6438c502c7546d5e6cc0e53498e2ef4088a2467c64edc1a2a9a7fce197f22294af7d52aca43e9be813069d2315f82e5e3c0ac02328ded5dab2d222ef9d9d6f
-
SSDEEP
768:yJXHqpAVVxzZeD7VB0tEfeDRmCJurkTOKgfo1OqJ4p9P7Xfl:yVH6ozm0+URturiVOg4J
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack002/pkunzip.exe_
Files
-
6639750d43d572f9d80a023a738c5974.zip.zip
Password: infected
-
6639750d43d572f9d80a023a738c5974.zip
Password: unzip-me
-
manifest.json
-
metadata.json
-
pkunzip.exe_.exe windows x86
Password: unzip-me
7c329352af0cc92d2cd618701925f421
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetOEMCP
TerminateProcess
GetCurrentProcess
HeapFree
HeapReAlloc
HeapAlloc
GetCommandLineA
GetVersion
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
RtlUnwind
WriteFile
GetCPInfo
GetACP
ExitProcess
GetProcAddress
LoadLibraryA
GetLastError
FlushFileBuffers
SetFilePointer
GetFileAttributesA
GetExitCodeProcess
WaitForSingleObject
CloseHandle
CreateProcessA
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
CreateFileA
Sections
.text Size: - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pklstb Size: 24KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.relo2 Size: 4KB - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
quarantine-acquire-file.cSq5zyfYQB2ihYpDZzeqRE.xml.xml
-
script.xml.xml
-
sysinfo.XGb1e8UmKu7jEXEbqIflMJ.xml.xml