Static task
static1
Behavioral task
behavioral1
Sample
0e60d49a967599fab179f8c885d91db25016be996d66a4e00cbb197e5085efa4.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0e60d49a967599fab179f8c885d91db25016be996d66a4e00cbb197e5085efa4.exe
Resource
win10v2004-20230220-en
General
-
Target
10680059491.zip
-
Size
143KB
-
MD5
1aed85b6fc2ef3f4ca900969049ac42b
-
SHA1
5196e6a37bd7d271a4e6bc2e75baed1bb74137d3
-
SHA256
52420eb3e32aa15b0c58d0a681b45acf124e0a79fc73c8e32222027eeceaf1b8
-
SHA512
3b1c0647320c6edf7b849d9ac6b3f15b19b8d6cd4bfeaf69dc70c364f913b4665832d2c80453513096f757f65fe8da9b2cd100f75e3f527f60506b11404137af
-
SSDEEP
3072:Ea8BF1EKTiNMLT7ErhXEdau5isUBG/P4KlLl8DYpBinxZCARnO:relT+MLahIdYGoG8DmUrCARO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/0e60d49a967599fab179f8c885d91db25016be996d66a4e00cbb197e5085efa4
Files
-
10680059491.zip.zip
Password: infected
-
0e60d49a967599fab179f8c885d91db25016be996d66a4e00cbb197e5085efa4.exe windows x86
Password: infected
f6a114275ec71b0f9e53c5ebb7d8d51d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateSemaphoreA
MoveFileExW
MultiByteToWideChar
WideCharToMultiByte
GetCurrentProcess
GetCurrentThread
Wow64DisableWow64FsRedirection
Wow64RevertWow64FsRedirection
GetModuleHandleA
GetProcAddress
WinExec
GetCurrentProcessId
GlobalAlloc
OpenProcess
GetSystemInfo
GetTickCount
MapViewOfFile
UnmapViewOfFile
CreateFileMappingA
SetEndOfFile
HeapSize
WriteConsoleW
FlushFileBuffers
GetProcessHeap
GetStringTypeW
CreateThread
WaitForMultipleObjects
Sleep
CreateMutexA
WaitForSingleObject
ReleaseMutex
ReleaseSemaphore
GetLastError
CloseHandle
WriteFile
SetFilePointerEx
SetFilePointer
SetFileAttributesW
ReadFile
GetLogicalDriveStringsW
GetFileSize
GetDriveTypeW
FindNextFileW
FindFirstFileW
FindClose
CreateFileW
TerminateProcess
CreateFileA
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
DecodePointer
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
SetStdHandle
HeapReAlloc
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
RtlUnwind
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
EncodePointer
RaiseException
ExitProcess
GetModuleHandleExW
GetFileAttributesExW
GetConsoleMode
ReadConsoleW
GetConsoleOutputCP
GetStdHandle
GetModuleFileNameW
GetCommandLineA
GetCommandLineW
HeapFree
HeapAlloc
GetFileType
GetFileSizeEx
CompareStringW
LCMapStringW
user32
FindWindowA
ShowWindow
shell32
SHEmptyRecycleBinA
SHChangeNotify
advapi32
QueryServiceStatusEx
OpenServiceA
EnumDependentServicesA
ControlService
RegSetValueExA
RegCreateKeyExA
RegCloseKey
OpenEventLogA
CloseEventLog
ClearEventLogA
GetTokenInformation
FreeSid
EqualSid
AllocateAndInitializeSid
OpenThreadToken
OpenProcessToken
OpenSCManagerA
EnumServicesStatusExA
CloseServiceHandle
CryptGenRandom
CryptReleaseContext
CryptAcquireContextA
mpr
WNetAddConnection2W
WNetAddConnection2A
WNetCloseEnum
WNetOpenEnumW
WNetEnumResourceW
ws2_32
WSAStartup
rstrtmgr
RmGetList
RmStartSession
RmEndSession
RmRegisterResources
Sections
.text Size: 172KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ