AAAAsssssssaaaIQ
Static task
static1
Behavioral task
behavioral1
Sample
Device/HarddiskVolume6/ /SA666eM4.EEwUkkA.OwwM.yyO.M4U.eeMc.oWm.dll
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
Device/HarddiskVolume6/ /SA666eM4.EEwUkkA.OwwM.yyO.M4U.eeMc.oWm.dll
Resource
win10v2004-20230703-en
General
-
Target
SA666eM4.EEwUkkA.OwwM.yyO.M4U.eeMc.oWm.qYYo
-
Size
18.4MB
-
MD5
bb2f596f86d5e95986e8cefbe5f1821d
-
SHA1
21d1ffa69c87eed697b3dd2fdbe038584f71beb1
-
SHA256
ddd4d6b9bb9e369c85766a62ca153935c08a99cf48944084fd0380b0650021d7
-
SHA512
4908c44a56efca79f89249a9f3998a221e0b572bb24ed4d0133020f09d5a5d74657fa8620f81bde45f2a04e07fe108736c6f353da7a3b871bdf4289ebd78cb13
-
SSDEEP
393216:RV5ttN9sUqFYrFUtGTV+LmOCqQOA/ju7ITG1qVFyOy/F:TDG5F+ZnO0MqVFdq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Device/HarddiskVolume6/ /SA666eM4.EEwUkkA.OwwM.yyO.M4U.eeMc.oWm.qYYo
Files
-
SA666eM4.EEwUkkA.OwwM.yyO.M4U.eeMc.oWm.qYYo.zip
Password: S@ndb0x!2023@@
-
Device/HarddiskVolume6/ /SA666eM4.EEwUkkA.OwwM.yyO.M4U.eeMc.oWm.qYYo.dll windows x86
Password: S@ndb0x!2023@@
b805e28b6e91a710459ef7e80eaaf792
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
GetModuleHandleW
GetCurrentProcess
HeapCreate
HeapAlloc
lstrlenA
HeapFree
Sleep
GetStartupInfoW
GetModuleHandleA
CreateThread
Toolhelp32ReadProcessMemory
GenerateConsoleCtrlEvent
GetThreadTimes
LockFileEx
CreateProcessW
FlushFileBuffers
CloseHandle
CreateFileW
HeapSize
GetCurrentThreadId
GetCommandLineA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetLastError
InterlockedDecrement
ExitProcess
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
WriteFile
GetConsoleCP
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapReAlloc
LoadLibraryW
GetModuleFileNameW
RtlUnwind
SetStdHandle
WriteConsoleW
MultiByteToWideChar
LCMapStringW
GetStringTypeW
IsProcessorFeaturePresent
user32
DeferWindowPos
CreateWindowStationW
CharNextW
ole32
CoRegisterChannelHook
CoFreeUnusedLibrariesEx
Exports
Exports
Sections
.text Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
manifest.json