Static task
static1
Behavioral task
behavioral1
Sample
75878356f2e131cefb8aeb07e777fcc110475f8c92417fcade97e207a94ac372.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
75878356f2e131cefb8aeb07e777fcc110475f8c92417fcade97e207a94ac372.exe
Resource
win10v2004-20231023-en
General
-
Target
12392225116.zip
-
Size
84KB
-
MD5
366afa7c2af3dbbe2cc9a81d8070cc8d
-
SHA1
415394c4d9cdac4439dbb30b6e135f635b2203f1
-
SHA256
38b0d39d1590c2d2c5ac5978998e33a4870f7bba82b8893793fbd6495d122b0d
-
SHA512
f8e247fbdbe82e23c53f118b51356b582fdb1cfb736c045a9eb7e11447a6802b5609c255f0076630997b84e3b673440d1d92b6451c0576e66fbea207ae281aef
-
SSDEEP
1536:OPZt1462XcHTaVwaCRatiRG6LD18tLkbsec7zaovG/IpFXQ6aCIvj1K:OPRvCAWVwxRXRjn1hlc3aovsIpFgR7vw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/75878356f2e131cefb8aeb07e777fcc110475f8c92417fcade97e207a94ac372
Files
-
12392225116.zip.zip
Password: infected
-
75878356f2e131cefb8aeb07e777fcc110475f8c92417fcade97e207a94ac372.exe windows:6 windows x64
a5dd8b448456ef8ea6c5dc359eaecc60
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetLastError
CloseHandle
MultiByteToWideChar
GetModuleHandleW
HeapFree
GetCommandLineW
InitializeCriticalSectionEx
HeapSize
CreateEventW
HeapReAlloc
RaiseException
HeapAlloc
DeleteCriticalSection
GetProcessHeap
WideCharToMultiByte
Sleep
CreateThread
GlobalLock
GlobalUnlock
CreateFileW
ReadFile
SetEndOfFile
WriteConsoleW
SetFilePointerEx
FlushFileBuffers
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
FindClose
WriteFile
EnterCriticalSection
LeaveCriticalSection
GetProcAddress
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
OutputDebugStringW
RtlPcToFileHeader
EncodePointer
RtlUnwindEx
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
SetLastError
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
GetStdHandle
GetACP
GetConsoleCP
GetConsoleMode
GetFileType
LCMapStringW
ReadConsoleW
user32
OpenClipboard
CloseClipboard
GetClipboardData
GetMessageW
GetKeyState
CallNextHookEx
GetAsyncKeyState
DispatchMessageW
GetWindowTextA
TranslateMessage
SetWindowsHookExW
GetWindowThreadProcessId
GetForegroundWindow
GetKeyNameTextA
advapi32
GetUserNameW
shell32
CommandLineToArgvW
Sections
.text Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 236B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ