Static task
static1
Behavioral task
behavioral1
Sample
vkfiles.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
vkfiles.exe
Resource
win10v2004-20231215-en
General
-
Target
5cb2a1aa412b9ceb6531d6650a3670f3
-
Size
6.5MB
-
MD5
5cb2a1aa412b9ceb6531d6650a3670f3
-
SHA1
c93ab90bbe55911ff54ef93af9cb1c6261d82d3e
-
SHA256
24aea40d932529f598b842f4ea121fce95424b966034f16798dbe8807db1afa4
-
SHA512
81731570586627cf1f3a849ec8154d30aed641b0f3613df6fbd5ed093b2d19a0cd4a6b32940ee5f1af81d961b11c0b32b655022fd19a0dc745ee62093edde395
-
SSDEEP
196608:5Sz41N9fRj9Dcy3yJdbEvyO5B2SYj6Dwz:5Sk1NhV9YyiLbugXOq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/vkfiles.exe
Files
-
5cb2a1aa412b9ceb6531d6650a3670f3.zip
-
vkfiles.exe.exe windows:4 windows x86 arch:x86
85a62abddcef18f412ed4f104dedb194
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
FindResourceA
GetProcAddress
Sleep
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
HeapReAlloc
VirtualAlloc
HeapAlloc
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
GetCPInfo
GetACP
GetOEMCP
GetStringTypeW
user32
SetTimer
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
PostQuitMessage
MessageBoxA
Sections
.text Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3.8MB - Virtual size: 3.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ