Static task
static1
Behavioral task
behavioral1
Sample
f62c1707f0d24d57923f8f77742626a427df2f4891294470919b7a81e022c3a1.exe
Resource
win7-20230220-en
General
-
Target
10498324521.zip
-
Size
909KB
-
MD5
ff6dbc17242f1597f6506202e3824e4c
-
SHA1
404187108d5bf7aaa0a9b8e5d84c7723249a4b9f
-
SHA256
82048095c2c958202b8943a08a6fda19474043d8c9eecd4255072e5ec81bdd2e
-
SHA512
456305e0739685d59c0e7bcaba7982052f698a04621d538af8029213cd71879024f15c30a413f773e70db2e15e324f7270cb071d26899363b368765e3d481016
-
SSDEEP
24576:Y/3HRK3Q2dJ44s1KeAReKQWPM2NXazLpqNx2Lp4:K3HYxdd2ieK102NMIKp4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/f62c1707f0d24d57923f8f77742626a427df2f4891294470919b7a81e022c3a1
Files
-
10498324521.zip.zip
Password: infected
-
f62c1707f0d24d57923f8f77742626a427df2f4891294470919b7a81e022c3a1.exe windows x86
98ee198cdadd381209fa7697a2f9808a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
htonl
gethostbyname
getservbyname
shutdown
gethostname
ioctlsocket
sendto
recvfrom
listen
accept
freeaddrinfo
getaddrinfo
WSAIoctl
socket
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
connect
closesocket
bind
send
recv
WSASetLastError
select
__WSAFDIsSet
WSAGetLastError
WSACleanup
WSAStartup
wldap32
ord33
ord46
ord211
ord60
ord50
ord301
ord200
ord30
ord79
ord35
ord143
ord32
ord27
ord26
ord22
ord41
shlwapi
PathRemoveFileSpecA
StrToIntA
kernel32
GetACP
HeapFree
HeapReAlloc
HeapAlloc
SetConsoleMode
ReadConsoleInputA
GetConsoleMode
SetConsoleCtrlHandler
ExitProcess
SetFilePointerEx
GetModuleHandleExW
FreeLibraryAndExitThread
CreateFileW
GetDriveTypeW
GetCurrentDirectoryW
GetModuleFileNameW
GetModuleFileNameA
DeleteFileA
Process32First
FindFirstFileA
EnterCriticalSection
GetCommandLineW
GetCurrentProcess
TerminateProcess
FindNextFileA
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
FindClose
WaitForSingleObject
GetFileAttributesW
GetModuleHandleA
OpenProcess
SetCurrentDirectoryA
GetCommandLineA
CreateToolhelp32Snapshot
MultiByteToWideChar
GetLastError
GetFileAttributesA
OutputDebugStringW
MoveFileExA
Process32Next
CloseHandle
WritePrivateProfileStringA
GetProcAddress
RemoveDirectoryA
DeleteCriticalSection
CreateProcessW
WideCharToMultiByte
lstrcmpiA
CreateDirectoryA
GetPrivateProfileStringA
ReadConsoleW
Sleep
GetUserDefaultLCID
GetCurrentProcessId
GetExitCodeProcess
ExitThread
TerminateThread
CreateThread
GetThreadContext
SetThreadContext
SetLastError
FormatMessageA
GetTickCount
InitializeCriticalSection
SleepEx
FreeLibrary
WaitForMultipleObjects
GetFileType
GetStdHandle
ReadFile
PeekNamedPipe
VerSetConditionMask
LoadLibraryA
GetSystemDirectoryA
VerifyVersionInfoA
GetSystemTime
SystemTimeToFileTime
WriteFile
GetCurrentThreadId
QueryPerformanceCounter
GlobalMemoryStatus
FlushConsoleInputBuffer
LoadLibraryExW
RtlUnwind
RaiseException
InitializeSListHead
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
ResetEvent
SetEvent
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
GetModuleHandleW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
CreateEventW
GetConsoleCP
SetErrorMode
IsValidLocale
EnumSystemLocalesW
GetTimeZoneInformation
FlushFileBuffers
GetFileAttributesExW
SetStdHandle
SetEndOfFile
GetProcessHeap
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
FindFirstFileExA
WriteConsoleW
DecodePointer
EncodePointer
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetFullPathNameW
SetEnvironmentVariableA
HeapSize
user32
GetProcessWindowStation
GetMessageA
DispatchMessageA
GetWindowRect
GetSystemMetrics
GetUserObjectInformationW
SetTimer
MessageBoxA
CreateWindowExA
TranslateMessage
SendMessageA
PostQuitMessage
RegisterClassExA
UpdateWindow
BeginPaint
EndPaint
RegisterClassExW
LoadIconA
DefWindowProcA
ShowWindow
advapi32
SystemFunction036
ReportEventA
RegisterEventSourceA
DeregisterEventSource
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
shell32
CommandLineToArgvW
comctl32
ord17
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 334KB - Virtual size: 333KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 39KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ