Static task
static1
Behavioral task
behavioral1
Sample
1d7c5347aa687da9da8c329811392faafd76aa3ddbd77b7774470d7f8ba094d9.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1d7c5347aa687da9da8c329811392faafd76aa3ddbd77b7774470d7f8ba094d9.exe
Resource
win10v2004-20230915-en
General
-
Target
11956839738.zip
-
Size
335KB
-
MD5
4f781d72fc3c71b7958c79da3eed290d
-
SHA1
cd2fb636f3b0b1d5ec1497940270e22cc9ee13b5
-
SHA256
505fac800e50c5f8fcd0c6ff69f8f99cf660a78e867cdbc291534edbde178bbb
-
SHA512
82f937a85e4754cc659b31d7cb88ad242166108039387fb5ec2cb813d8960b81a1a0bbe8804c1c743233d1733d177c4e30436646b96c8b48adcf8da1c303e0e2
-
SSDEEP
6144:cyGJ3oLrEqhvdRGfduqznwOmzBWeHSMFBR+V4/Dz6ILdJVKRHWVEFLxBoFXzzauL:jGeLjhvLGfdhbJmzBWBMFBRjz6+dJV4I
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/1d7c5347aa687da9da8c329811392faafd76aa3ddbd77b7774470d7f8ba094d9
Files
-
11956839738.zip.zip
Password: infected
-
1d7c5347aa687da9da8c329811392faafd76aa3ddbd77b7774470d7f8ba094d9.exe windows:4 windows x86
978a83e4e4fc81bd6ec2e78d6b0dafbd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoCreateInstance
CoInitialize
user32
ShowWindow
PeekMessageW
SetWindowTextW
MessageBoxW
CreateDialogParamW
LoadIconW
SendMessageW
GetMessageW
EnableWindow
GetDlgItem
IsDialogMessageW
TranslateMessage
DispatchMessageW
SetDlgItemTextW
DestroyWindow
advapi32
RegQueryValueExW
RegDeleteValueW
RegOpenKeyExW
RegCloseKey
RegDeleteKeyW
shell32
SHGetFolderPathW
msvcrt
wcslen
wcscpy
wcsncpy
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
memset
wcscat
kernel32
SetFileAttributesW
DeleteFileW
MoveFileExW
GetFileAttributesW
GetModuleHandleW
GetProcAddress
RemoveDirectoryW
GetModuleFileNameW
GetTempPathW
GetCurrentThreadId
GetTickCount
GetCurrentProcessId
CreateDirectoryW
LocalFree
FormatMessageW
GetModuleHandleA
GetStartupInfoA
GetCommandLineW
GetLastError
CopyFileW
CloseHandle
CreateProcessW
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp1 Size: 560KB - Virtual size: 1.7MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE