Static task
static1
Behavioral task
behavioral1
Sample
449df90b819d01d290d218929bd33ee24941b3e6c00cdedc0e6f2714aea8460b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
449df90b819d01d290d218929bd33ee24941b3e6c00cdedc0e6f2714aea8460b.exe
Resource
win10v2004-20230220-en
General
-
Target
10716396940.zip
-
Size
1.2MB
-
MD5
72edf15395ddecf83bf9289d01ff5f9f
-
SHA1
f1fd1e9caef47d514b401137b461ecd04edc14b9
-
SHA256
66ac60f74a3f065e837453accf4b71d7fb493eff7398d2228aa0e5aad1d6b676
-
SHA512
334822a352774bdd0fe2c755e7eed9d6492079dcb75e5f67d02f6472a59abce3b050a0f7d5b2ba7091c629307b6dabed4194624fc1192e353aff2be32506e587
-
SSDEEP
24576:2MxUalCMD3m9j0oGYORh3wfnN87CunsLq6Ahdw313HQR:2MxUa0oW9j0xHRefnNiCymq6YCF34
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/449df90b819d01d290d218929bd33ee24941b3e6c00cdedc0e6f2714aea8460b
Files
-
10716396940.zip.zip
Password: infected
-
449df90b819d01d290d218929bd33ee24941b3e6c00cdedc0e6f2714aea8460b.exe windows x86
11fc1edb442e257617e8672be635a02f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
HeapReAlloc
CloseHandle
RaiseException
CreateThread
HeapAlloc
DecodePointer
GetProcAddress
SetFilePointerEx
DeleteCriticalSection
GetCurrentProcessId
GetProcessHeap
GetModuleHandleW
WideCharToMultiByte
lstrcmpiW
CreateIoCompletionPort
MoveFileW
GetDriveTypeW
FlushFileBuffers
SetLastError
InitializeSRWLock
ReleaseSRWLockExclusive
ReleaseSRWLockShared
AcquireSRWLockExclusive
AcquireSRWLockShared
GetCurrentThreadId
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemDirectoryA
FreeLibrary
LoadLibraryA
FormatMessageA
Sleep
VirtualFree
MultiByteToWideChar
GetStdHandle
GetFileType
GetEnvironmentVariableW
GetACP
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
FindClose
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
GetLogicalDriveStringsW
HeapSize
OpenProcess
CreateFileW
InitializeCriticalSectionEx
CreateMutexW
SetEndOfFile
GetQueuedCompletionStatus
InitializeConditionVariable
InitializeCriticalSection
LeaveCriticalSection
WaitForMultipleObjects
WakeAllConditionVariable
TerminateProcess
WriteFile
GetCurrentProcess
GetTimeZoneInformation
GetFullPathNameW
GetCurrentDirectoryW
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
FindNextFileW
GetCommandLineW
EnterCriticalSection
HeapFree
GetFileSizeEx
FindFirstFileW
CancelIo
ReadFile
GetLocaleInfoW
LCMapStringW
CompareStringW
SleepConditionVariableCS
GetFileAttributesExW
CreateProcessW
GetExitCodeProcess
WaitForSingleObject
GetConsoleOutputCP
GetModuleFileNameW
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileInformationByHandle
SetConsoleCtrlHandler
GetModuleHandleExW
ExitProcess
LoadLibraryExW
RtlUnwind
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
CreateEventW
InitializeCriticalSectionAndSpinCount
OutputDebugStringW
IsDebuggerPresent
GetNativeSystemInfo
GetStringTypeW
EncodePointer
LCMapStringEx
GetCPInfo
WriteConsoleW
user32
GetProcessWindowStation
wsprintfW
MessageBoxW
GetUserObjectInformationW
advapi32
CryptDestroyHash
RegisterEventSourceW
ReportEventW
CryptAcquireContextW
CryptReleaseContext
CryptDestroyKey
CryptSetHashParam
CryptGetProvParam
CryptGetUserKey
CryptExportKey
CryptEnumProvidersW
CryptSignHashW
DeregisterEventSource
CryptCreateHash
CryptDecrypt
shell32
CommandLineToArgvW
ShellExecuteW
rstrtmgr
RmEndSession
RmGetList
RmRegisterResources
RmStartSession
crypt32
CertOpenStore
CertCloseStore
CertEnumCertificatesInStore
CertFindCertificateInStore
CertDuplicateCertificateContext
CertFreeCertificateContext
CertGetCertificateContextProperty
netapi32
NetShareEnum
NetApiBufferFree
iphlpapi
GetIpAddrTable
ws2_32
select
ntohs
getsockopt
ioctlsocket
bind
WSACleanup
closesocket
ntohl
WSASocketW
WSAStartup
socket
WSAAddressToStringW
htonl
htons
WSAGetLastError
inet_addr
inet_ntoa
gethostbyaddr
getservbyport
getservbyname
WSASetLastError
recv
send
connect
gethostbyname
setsockopt
shutdown
WSAIoctl
bcrypt
BCryptGenRandom
Sections
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 524KB - Virtual size: 524KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ