Static task
static1
Behavioral task
behavioral1
Sample
862b4e894033e1fbe067a0985dd034799e7506e7a694cd87aa25ee59ca571b85.exe
Resource
win10v2004-20231020-en
General
-
Target
12529918536.zip
-
Size
49KB
-
MD5
0d464f834a08c74c221049c36c7f3d0c
-
SHA1
4039f553fe370afbd4911fe94c01f44e2c90c791
-
SHA256
137660b458a8fa2175068734f5062ab8d790ccddb565edd9728793f1c315befb
-
SHA512
dd376d86cc233ab79899a023acac80784640099bd3ace8eb2bba9b0b6e73fd32f1cd57f15948b990dbf70ef1a016e7013dc30a2051580c1cb26904699e704b09
-
SSDEEP
768:NAdiY78dQDr435WGNkgKlZ5BfGnnMn218i/tyHMY1I+2bkUSSGtqZ0:NwiYgoZgYZrenO48iohI4dbd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/862b4e894033e1fbe067a0985dd034799e7506e7a694cd87aa25ee59ca571b85
Files
-
12529918536.zip.zip
Password: infected
-
862b4e894033e1fbe067a0985dd034799e7506e7a694cd87aa25ee59ca571b85.exe windows:6 windows x86
4b1ff0c9c18959b0c2ae2aa2b40bc3d0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
lstrcpyW
CreateFileW
CreateMutexA
GetLastError
HeapSize
HeapReAlloc
WriteConsoleW
LoadLibraryW
OutputDebugStringW
LoadLibraryExW
GetModuleFileNameA
FlushFileBuffers
SetStdHandle
LCMapStringEx
ReadFile
CreateFileA
Sleep
CreateThread
CloseHandle
K32EnumProcesses
TerminateProcess
GetStringTypeW
FreeEnvironmentStringsW
GetEnvironmentStringsW
K32GetModuleFileNameExA
OpenProcess
K32EnumProcessModules
GetCurrentProcess
GetTickCount64
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetConsoleCP
WideCharToMultiByte
IsDebuggerPresent
IsProcessorFeaturePresent
HeapFree
HeapAlloc
GetCommandLineW
InterlockedIncrement
InterlockedDecrement
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
SetLastError
GetCurrentThreadId
MultiByteToWideChar
UnhandledExceptionFilter
SetUnhandledExceptionFilter
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetStartupInfoW
GetModuleHandleW
GetProcAddress
GetProcessHeap
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
RtlUnwind
SetFilePointer
SetFilePointerEx
GetConsoleMode
ReadConsoleW
GetStdHandle
GetFileType
DeleteCriticalSection
InitOnceExecuteOnce
ExitProcess
GetModuleHandleExW
AreFileApisANSI
WriteFile
SetEndOfFile
user32
EndPaint
BeginPaint
PostQuitMessage
DestroyWindow
RegisterClassExW
LoadCursorW
LoadIconW
DispatchMessageW
TranslateMessage
TranslateAcceleratorW
GetMessageW
LoadAcceleratorsW
LoadStringW
DefWindowProcW
advapi32
RegSetValueExW
LookupPrivilegeValueW
AdjustTokenPrivileges
RegGetValueW
RegOpenKeyExW
RegCloseKey
OpenProcessToken
RegDeleteValueW
shell32
ShellExecuteA
shlwapi
PathFileExistsA
StrCmpW
hid
HidD_GetAttributes
HidD_GetPreparsedData
HidP_GetCaps
HidD_GetHidGuid
HidD_FreePreparsedData
setupapi
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceInterfaceDetailW
SetupDiEnumDeviceInterfaces
SetupDiGetClassDevsW
Sections
.text Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ