Static task
static1
Behavioral task
behavioral1
Sample
035df35539d585fe1934b2b8098a4fe186c979657c53f1f848b60a888ecac85f.exe
Resource
win10v2004-20230703-en
General
-
Target
11206931545.zip
-
Size
243KB
-
MD5
c548d5e6722f3c6fb14894b9236bf21d
-
SHA1
3f9ce92d6905f3873fac9154a9eca9da912d221b
-
SHA256
c55f5b1042f58a652db8e8b11db3be27f86fda100c81c63d2e8c7cba92916437
-
SHA512
b0bd95552d878e7ef1c09d9f4cbdcfd5f93e8b58dbe9435870fdbed7e7cc32f0d0ded646e080823e0168e14dae85ef310bdd7fe0323471d0a10db35afe2d2868
-
SSDEEP
6144:v6ur97aFQl6yGM7dGjcENDMUHTDwL+wdy54T6yVZwYmyzV:v6urGQltZGVzOQ54Lncyh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/035df35539d585fe1934b2b8098a4fe186c979657c53f1f848b60a888ecac85f
Files
-
11206931545.zip.zip
Password: infected
-
035df35539d585fe1934b2b8098a4fe186c979657c53f1f848b60a888ecac85f.exe windows x64
663c09a53d51cf865104c69e6bf00d59
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
CreateFileW
GetCurrentThreadId
HeapSize
GetCurrentDirectoryW
WriteConsoleW
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
WriteFile
GetConsoleCP
FlushFileBuffers
ReadConsoleW
GetConsoleMode
SetFilePointerEx
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetFileType
HeapFree
HeapReAlloc
HeapAlloc
GetACP
GetStdHandle
GetModuleHandleExW
ExitProcess
GetFullPathNameW
RtlUnwindEx
LoadLibraryExW
FreeLibrary
RaiseException
RtlPcToFileHeader
SetLastError
ReadFile
WideCharToMultiByte
GetModuleHandleW
GetProcAddress
LoadLibraryW
CloseHandle
GetLastError
MultiByteToWideChar
CreateMutexA
GetModuleFileNameW
OutputDebugStringA
GetDriveTypeW
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
SetEndOfFile
TlsFree
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
EncodePointer
DecodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
user32
EnumDisplayMonitors
GetMonitorInfoW
DefWindowProcW
GetWindowRect
GetFocus
GetDC
GetPropW
CreateWindowExW
ScreenToClient
RemovePropW
SetWindowTextW
ShowWindow
RegisterClassW
MessageBoxA
MoveWindow
IntersectRect
SetFocus
SetPropW
SetCapture
GetClientRect
UpdateLayeredWindow
ReleaseCapture
InvalidateRect
ReleaseDC
BeginPaint
EndPaint
GetWindowLongW
gdi32
BitBlt
CreateCompatibleBitmap
SelectObject
CreateCompatibleDC
DeleteDC
GetObjectW
DeleteObject
GetCurrentObject
advapi32
RegDeleteKeyValueW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
shell32
ShellExecuteW
Sections
.text Size: 370KB - Virtual size: 370KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 516B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 94KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ