Static task
static1
Behavioral task
behavioral1
Sample
826e3f4fa6ac406d4143c9031704d1f1ae474740c59769deaf7c3bd0886f7828.dll
Resource
win7-20230831-en
General
-
Target
11696286759.zip
-
Size
311KB
-
MD5
1306e68fa29a931472301f1c6732f45c
-
SHA1
e939bf34f4a608c8953fbbf83d7da533e32e9f5e
-
SHA256
0b0a251719cc3c7f1a7cc1ce8b62f7b40b7747af08bcb9dc3ce95ccc94bd78b7
-
SHA512
aa94b6114da0ee852752e6fb997c50e7df81d0355c72162a421f836508b9eec1d42a792eea36b1275be54a5f07031e48b4aa0f94da82586ace8b3cd0e921b0be
-
SSDEEP
6144:0IALLDfRYIUceI9eFiKGU1IeHNjeBmHwl9bf46wOx2G6uCEXv/tOj:0RLvfRYueuKGmbjnHwlVw6wOxJ6uCM4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/826e3f4fa6ac406d4143c9031704d1f1ae474740c59769deaf7c3bd0886f7828
Files
-
11696286759.zip.zip
Password: infected
-
826e3f4fa6ac406d4143c9031704d1f1ae474740c59769deaf7c3bd0886f7828.dll windows x86
Password: infected
f84800c8c63f43928b6ea707548ac3f3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
DefineDosDeviceA
GetProcessWorkingSetSize
GetFileAttributesExW
DeactivateActCtx
GetThreadTimes
WriteProfileStringA
GetFileType
FindFirstFileExA
GetCurrentThreadId
GetModuleFileNameW
GetBinaryTypeW
DeleteFileA
GetComputerNameW
GetCommTimeouts
GetDiskFreeSpaceExW
GetStringTypeW
GetCurrentDirectoryA
GetThreadContext
GetSystemTimeAsFileTime
DeleteVolumeMountPointW
GetConsoleTitleW
GetConsoleCursorInfo
GetTempPathA
GetVersion
gdi32
GetViewportOrgEx
GetSystemPaletteEntries
GetWindowExtEx
GetTextExtentExPointI
GetRegionData
GetDeviceGammaRamp
GetViewportExtEx
winspool.drv
FindFirstPrinterChangeNotification
GetPrinterW
user32
GetWindowTextA
EnumWindowStationsA
GetMessageTime
GetMenuDefaultItem
GetClassInfoExA
GetKeyState
LoadMenuW
DefWindowProcW
GetMessageA
DestroyMenu
DestroyCursor
oleaut32
LoadTypeLibEx
mscms
GetStandardColorSpaceProfileW
advapi32
GetCurrentHwProfileA
GetUserNameW
RegOpenKeyA
GetCurrentHwProfileW
msvcrt
memset
strcmp
urlmon
GetClassFileOrMime
version
GetFileVersionInfoSizeA
secur32
GetUserNameExW
InitializeSecurityContextA
GetUserNameExA
EnumerateSecurityPackagesW
ole32
GetConvertStg
shlwapi
GetMenuPosFromID
wininet
FindNextUrlCacheGroup
Sections
.text Size: 92KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 260KB - Virtual size: 256KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ