Static task
static1
Behavioral task
behavioral1
Sample
c541c5e2787b9465afb1adf5c329126fe8d9f19898f3653b6fe899a0dd39f96d.exe
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
c541c5e2787b9465afb1adf5c329126fe8d9f19898f3653b6fe899a0dd39f96d.exe
Resource
win10v2004-20230703-en
General
-
Target
c541c5e2787b9465afb1adf5c329126fe8d9f19898f3653b6fe899a0dd39f96d.zip
-
Size
21KB
-
MD5
94e6b236996823caec7ef7c7a2a4bd12
-
SHA1
aacc14617a5502024fcbda92eb501cb7f8b957c0
-
SHA256
57a7ad562da43c0c13baafda90b967053b609e04310edf49b8122114d1f5a50e
-
SHA512
5d528b5d1c5f225a1664b031b98118a1ca58999be5457ea37d475844dd3ef086054ca5ec152c172863a2e06db12aa21305f24df32ce96b2828b05ec362e8c59d
-
SSDEEP
384:GxownPNOJZ9g+fCx5tpU1/h5h0paZUvJJkooKH6ANMQgl7My4peuR49swn+A:LQOrtCxpeh5hZgJJkoPH6ANBW7n4peue
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/c541c5e2787b9465afb1adf5c329126fe8d9f19898f3653b6fe899a0dd39f96d
Files
-
c541c5e2787b9465afb1adf5c329126fe8d9f19898f3653b6fe899a0dd39f96d.zip.zip
Password: infected
-
c541c5e2787b9465afb1adf5c329126fe8d9f19898f3653b6fe899a0dd39f96d.exe windows x64
cf35895edbb8b9620674ff7b70ef4455
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
EventUnregister
EventSetInformation
EventRegister
EventWriteTransfer
EventActivityIdControl
kernel32
GetModuleFileNameA
InitOnceBeginInitialize
CreateSemaphoreExW
HeapFree
SetLastError
ReleaseSemaphore
GetModuleHandleExW
WaitForSingleObject
GetCurrentThreadId
ReleaseMutex
FormatMessageW
GetLastError
GetModuleHandleW
OutputDebugStringW
InitOnceComplete
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
GetCommandLineW
GetProcAddress
CreateMutexExW
GetCurrentProcessId
GetProcessHeap
DebugBreak
IsDebuggerPresent
HeapSetInformation
GetVersionExW
ReleaseSRWLockExclusive
lstrlenW
HeapAlloc
gdi32
GetClipBox
GetStockObject
user32
PostQuitMessage
SetCursor
LoadCursorW
TranslateMessage
IsRectEmpty
RegisterClassW
DispatchMessageW
ReleaseDC
LoadStringW
GetSystemMetrics
CreateWindowExW
GetDC
PostMessageW
DefWindowProcW
GetMessageW
GetActiveWindow
GetCursorPos
msvcrt
_exit
_cexit
__setusermatherr
_initterm
__C_specific_handler
_fmode
exit
_lock
_unlock
__dllonexit
_onexit
??1type_info@@UEAA@XZ
?terminate@@YAXXZ
__set_app_type
__getmainargs
_amsg_exit
_XcptFilter
__CxxFrameHandler3
_CxxThrowException
_callnewh
?what@exception@@UEBAPEBDXZ
??1exception@@UEAA@XZ
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@AEBQEBDH@Z
malloc
free
memcpy_s
_vsnwprintf
_commode
wcschr
_wtoi
memset
api-ms-win-core-synch-l1-2-0
Sleep
api-ms-win-core-rtlsupport-l1-1-0
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
api-ms-win-core-errorhandling-l1-1-0
SetUnhandledExceptionFilter
UnhandledExceptionFilter
api-ms-win-core-processthreads-l1-1-0
GetCurrentProcess
TerminateProcess
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-sysinfo-l1-1-0
GetSystemTimeAsFileTime
GetTickCount
comctl32
ord344
Sections
.text Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 100B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ