Static task
static1
Behavioral task
behavioral1
Sample
e0178ab0893a4f25c68ded11e74ad90403443e413413501d138e0b08a910471e.exe
Resource
win10-20230703-en
General
-
Target
11197610260.zip
-
Size
5.1MB
-
MD5
b227045ab4b2792077796b0067a51da7
-
SHA1
37ab593839978c3bead3168b9f99114b6e144f87
-
SHA256
97923792a6714e956d603da5a4af099300bbbafe5213be1ebf22f24c03623ee5
-
SHA512
869caf66abdb87904a6820661198444786cdc17e0fb0064fa3cf5742ebd03669e477a3be4df6588cde03536f165c0ffbc4c6111b0bb2a359cd037676281bdc89
-
SSDEEP
98304:1TcbSqC6YwDtUcJcPX1/4WxC2Pfj4DCt5fzBjru0EudC/aQhUpe:+C2W3PiwH8Wt5fl+0Biape
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/e0178ab0893a4f25c68ded11e74ad90403443e413413501d138e0b08a910471e
Files
-
11197610260.zip.zip
Password: infected
-
e0178ab0893a4f25c68ded11e74ad90403443e413413501d138e0b08a910471e.exe windows x64
8c2bf1919197806032eb74654ea36554
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
SetFileApisToANSI
IsDebuggerPresent
DecodePointer
GetLastError
SetLastError
GetErrorMode
SetErrorMode
GetThreadErrorMode
IsThreadAFiber
TransactNamedPipe
WaitNamedPipeW
CallNamedPipeW
GetProcessHeap
DeviceIoControl
WaitForSingleObject
WaitForSingleObjectEx
CreateMutexA
Sleep
GetCurrentProcess
GetCurrentProcessId
SwitchToThread
CreateThread
GetCurrentThread
GetCurrentThreadId
TlsAlloc
TlsGetValue
CreateProcessA
CreateProcessW
FlushProcessWriteBuffers
FlushInstructionCache
OpenProcess
GetCurrentProcessorNumber
GetVersion
GetTickCount
GetTickCount64
GetSystemDirectoryW
GetComputerNameExA
VirtualAlloc
VirtualAllocEx
WriteProcessMemory
GetLargePageMinimum
CreateTimerQueue
CreateThreadpoolCleanupGroup
GetModuleFileNameA
GetModuleFileNameW
GetProcAddress
LoadLibraryA
LoadLibraryW
ConvertFiberToThread
IsSystemResumeAutomatic
EraseTape
MulDiv
GetSystemDEPPolicy
lstrcatW
CopyFileW
WTSGetActiveConsoleSessionId
GetActiveProcessorGroupCount
GetMaximumProcessorGroupCount
UnregisterApplicationRecoveryCallback
UnregisterApplicationRestart
SetFileApisToOEM
GetOEMCP
GetThreadLocale
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
GetUserDefaultLangID
GetSystemDefaultLangID
GetSystemDefaultLCID
GetUserDefaultLCID
GetThreadUILanguage
FreeConsole
GetConsoleCP
GetConsoleOutputCP
GetConsoleWindow
GetConsoleAliasExesLengthA
GetConsoleAliasExesLengthW
Process32NextW
CreateFileA
WriteFile
lstrcatA
VerSetConditionMask
FindFirstFileA
ReadFile
GetSystemInfo
GetVersionExA
GetModuleHandleA
GetModuleHandleW
lstrcpynA
VerifyVersionInfoW
GlobalFree
LocalFree
Process32First
Process32Next
SetFilePointerEx
GetConsoleMode
FlushFileBuffers
HeapReAlloc
HeapSize
GetStringTypeW
SetStdHandle
GetFileType
FreeEnvironmentStringsW
GetEnvironmentStringsW
WriteConsoleW
WideCharToMultiByte
MultiByteToWideChar
GetCPInfo
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
LCMapStringW
AreFileApisANSI
GetShortPathNameW
GetLogicalDrives
DeleteFileA
CreateFileW
CreateDirectoryW
GetEnvironmentVariableW
GetEnvironmentStrings
GetCommandLineW
GetCommandLineA
lstrlenA
lstrcpyA
GetACP
GlobalAlloc
Process32FirstW
CreateToolhelp32Snapshot
lstrlenW
lstrcpyW
lstrcmpW
HeapAlloc
HeapFree
GetStdHandle
GetModuleHandleExW
TerminateProcess
LoadLibraryExW
FreeLibrary
TlsFree
TlsSetValue
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
EncodePointer
RtlUnwindEx
RaiseException
RtlPcToFileHeader
InitializeSListHead
GetSystemTimeAsFileTime
QueryPerformanceCounter
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
ExitProcess
K32QueryWorkingSetEx
CloseHandle
user32
IsClipboardFormatAvailable
GetFocus
GetCapture
SetTimer
KillTimer
GetForegroundWindow
CountClipboardFormats
CloseClipboard
FlashWindow
SendMessageW
GetPropW
MessageBoxW
ClientToScreen
ScreenToClient
GetSysColor
GetWindowLongW
GetDesktopWindow
GetParent
CharUpperA
GetSystemMetrics
GetDC
FindWindowW
ReleaseDC
CharUpperBuffW
wsprintfW
wsprintfA
GetClientRect
gdi32
SetStretchBltMode
StretchBlt
GetDIBits
DeleteDC
CreateCompatibleBitmap
Polyline
SelectObject
Rectangle
GetTextExtentPoint32W
DeleteObject
CreateCompatibleDC
BitBlt
GetObjectA
advapi32
AdjustTokenPrivileges
RegDisablePredefinedCacheEx
LookupPrivilegeValueA
OpenProcessToken
shell32
SHGetSpecialFolderPathA
ShellExecuteW
ole32
CoCreateGuid
wininet
InternetOpenA
InternetCloseHandle
InternetConnectA
InternetReadFile
HttpOpenRequestA
HttpSendRequestA
winmm
waveOutUnprepareHeader
waveOutWrite
timeGetTime
waveOutPrepareHeader
shlwapi
StrChrA
StrStrA
ord158
ws2_32
closesocket
connect
htons
socket
gethostbyname
WSAStartup
WSACleanup
recv
send
comctl32
ImageList_GetImageCount
ImageList_Draw
gdiplus
GdipGetImageEncoders
GdipGetImageEncodersSize
netapi32
NetApiBufferFree
NetWkstaGetInfo
Sections
.text Size: 11.6MB - Virtual size: 11.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 232B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 173KB - Virtual size: 173KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ