Static task
static1
Behavioral task
behavioral1
Sample
aipackagechainer.exe
Resource
win10v2004-20231025-es
General
-
Target
MDE_File_Sample_ff6bcda2cc5235d37f4cd64aa18388226e179804.zip
-
Size
247KB
-
MD5
2b33c0e48d66d517f885b1a67fb63adc
-
SHA1
8e4842ab9f89ccb37547daef1e208a217923bc82
-
SHA256
bfd5418eb68cd607094fa301fe62960b1d4e050807a2f3b423561b3829c5dc16
-
SHA512
6ed17c10e01b7127cfae9aae92331bfc1db064e274da422a2f83f4ce7b52bc1b65a678fb1894c6dce30a2f424ca19de748428caafb214f6e3db0f3257bce9680
-
SSDEEP
6144:F82t4GHkIONg/528jrTq7RE/MYmxytZCGTmS8:FNtfH2CTjrv/rm4tZ1Tr8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/aipackagechainer.exe
Files
-
MDE_File_Sample_ff6bcda2cc5235d37f4cd64aa18388226e179804.zip.zip
Password: infected
-
aipackagechainer.exe.exe windows:6 windows x86 arch:x86
441dd684f791b939ffbaa976fd9c1626
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
netapi32
NetApiBufferFree
NetLocalGroupGetInfo
kernel32
InitializeCriticalSectionEx
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
FlushInstructionCache
WriteConsoleW
FileTimeToSystemTime
FindFirstFileW
DeleteFileW
RemoveDirectoryW
FindNextFileW
GetLogicalDriveStringsW
GetDriveTypeW
CloseHandle
GetFileSize
GetFileAttributesW
GetShortPathNameW
CreateFileW
CreateDirectoryW
SetFileAttributesW
GetFileTime
GetLastError
CopyFileW
ReadFile
WriteFile
SetFilePointer
SystemTimeToFileTime
FindClose
GetTempPathW
GetTempFileNameW
MoveFileW
GetProcAddress
GetSystemDirectoryW
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
HeapDestroy
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
GetProcessHeap
LoadLibraryExW
LoadLibraryW
LocalFree
FreeLibrary
GetLocalTime
WideCharToMultiByte
MultiByteToWideChar
lstrcmpiW
GetModuleFileNameW
SetCurrentDirectoryW
OpenMutexW
WaitForSingleObject
RaiseException
GetModuleHandleW
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetCurrentThreadId
DecodePointer
InterlockedPushEntrySList
GetConsoleMode
GetConsoleOutputCP
SetFilePointerEx
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
FindFirstFileExW
GetOEMCP
GetACP
IsValidCodePage
GetFileType
GetTimeZoneInformation
LCMapStringW
CompareStringW
GetModuleHandleExW
ExitProcess
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlUnwind
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStartupInfoW
WaitForSingleObjectEx
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
InterlockedPopEntrySList
InitializeSListHead
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
GetStringTypeW
SetLastError
GetDiskFreeSpaceExW
GetEnvironmentVariableW
OutputDebugStringW
CreateThread
Sleep
InitializeCriticalSection
GetCurrentProcessId
FlushFileBuffers
GetFullPathNameW
FormatMessageW
GetSystemDefaultLangID
GetWindowsDirectoryW
GetCurrentProcess
GetStdHandle
CreateProcessW
GetExitCodeProcess
EncodePointer
GetLocaleInfoW
GetSystemTime
GetDateFormatW
GetTimeFormatW
CreateEventW
GetExitCodeThread
TerminateThread
VerifyVersionInfoW
VerSetConditionMask
SetEvent
ResetEvent
GlobalFree
LocalAlloc
Wow64DisableWow64FsRedirection
Wow64RevertWow64FsRedirection
MulDiv
CompareFileTime
CopyFileExW
GetTickCount
IsDebuggerPresent
GetCPInfo
user32
SetFocus
MessageBeep
ExitWindowsEx
UnregisterClassW
DefWindowProcW
CharNextW
DestroyWindow
SetWindowTextW
SendMessageW
MsgWaitForMultipleObjectsEx
PeekMessageW
TranslateMessage
DispatchMessageW
GetActiveWindow
PostMessageW
IsWindow
GetDlgItem
SetWindowPos
MapWindowPoints
GetClientRect
GetParent
GetWindowRect
GetMonitorInfoW
MonitorFromWindow
GetWindowLongW
GetWindow
ShowWindow
InvalidateRect
EnableWindow
CreateDialogParamW
SetWindowLongW
EndDialog
GetForegroundWindow
MessageBoxW
DialogBoxParamW
LoadImageW
GetSystemMetrics
LoadStringW
SetForegroundWindow
IsWindowVisible
GetWindowTextW
GetWindowTextLengthW
CreateWindowExW
GetSystemMenu
ModifyMenuW
DestroyMenu
CallWindowProcW
RedrawWindow
shell32
SHGetFolderPathW
ShellExecuteW
ShellExecuteExW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHGetMalloc
ole32
CoInitialize
CoUninitialize
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
oleaut32
VariantInit
VariantClear
SysAllocString
SysFreeString
VariantTimeToSystemTime
SystemTimeToVariantTime
VarUdateFromDate
VariantCopy
VarUI4FromStr
shlwapi
PathIsDirectoryW
PathFileExistsW
PathAppendW
PathIsUNCW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
mpr
WNetAddConnection2W
Sections
.text Size: 355KB - Virtual size: 355KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 118KB - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ