Static task
static1
Behavioral task
behavioral1
Sample
instaluj.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
instaluj.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
patch.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
patch.exe
Resource
win10v2004-20231215-en
General
-
Target
6959f4a815e1445fe7106c3de6f7438f
-
Size
1.2MB
-
MD5
6959f4a815e1445fe7106c3de6f7438f
-
SHA1
f077c70275ea365754b3ad516f14ea8b039fc473
-
SHA256
e49d78026bf157c3c33fc861346c89eaf0b51863e98e6bbbf682dfb65c357d18
-
SHA512
a8d196a23f1b9451a30858c74befbc105907800ad36d456cb5e8a0e152d635a89049b8038eaa8e4c4b09e20325e54ad7276fdfbfdee84d56fa8f65bae216a867
-
SSDEEP
24576:ttsphADlG4UfuUwwRHg5SDpAfKP4tcD4I+E3g7ZzY+n+FZDRXwJHWt4:ttFlG4qhgl0MnZs++NwhWt4
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/instaluj.exe unpack001/patch.exe
Files
-
6959f4a815e1445fe7106c3de6f7438f.zip
-
PRZECZYTAJ jak instalowac.txt
-
instaluj.exe.exe windows:4 windows x86 arch:x86
d910f5763d6ea0df0e9280fa07d2fb6b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCPInfo
GetOEMCP
ExitProcess
TerminateProcess
HeapAlloc
HeapFree
RtlUnwind
GetStartupInfoA
GetCommandLineA
RaiseException
HeapReAlloc
HeapSize
GetACP
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
IsBadReadPtr
IsBadCodePtr
SizeofResource
GetProfileStringA
SetEndOfFile
FlushFileBuffers
GetCurrentProcess
SetErrorMode
GetProcessVersion
LoadLibraryA
FreeLibrary
FindResourceA
LoadResource
GetVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GetModuleHandleA
GetProcAddress
SetLastError
WideCharToMultiByte
InterlockedIncrement
lstrcpyA
lstrcatA
WritePrivateProfileStringA
InterlockedDecrement
GlobalFlags
lstrlenA
lstrcpynA
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
GlobalUnlock
GlobalFree
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
MultiByteToWideChar
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
WriteFile
SetFileTime
LocalFileTimeToFileTime
GetCurrentDirectoryA
SystemTimeToFileTime
ReadFile
CloseHandle
CreateFileA
SetFilePointer
GetModuleFileNameA
Sleep
CreateDirectoryA
GetLastError
GetWindowsDirectoryA
GetSystemDirectoryA
DeleteFileA
GetVersionExA
user32
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
DefWindowProcA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
GetSysColorBrush
LoadStringA
DestroyMenu
InvalidateRect
IsIconic
GetWindowPlacement
GetSystemMetrics
SetFocus
ShowWindow
SetWindowPos
SetWindowLongA
GetWindowTextLengthA
GetMessageTime
GetDlgItem
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetMenuItemCount
wsprintfA
UnhookWindowsHookEx
GetWindowTextA
SetWindowTextA
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
GetClassNameA
ScreenToClient
ClientToScreen
LoadCursorA
GetCapture
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
MessageBoxA
FindWindowA
PostMessageA
PostQuitMessage
UnregisterClassA
HideCaret
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
GetMessagePos
GetForegroundWindow
SetForegroundWindow
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
EnableWindow
SetCursor
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
DefDlgProcA
SendMessageA
IsWindowUnicode
CharNextA
InflateRect
GetDC
gdi32
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
IntersectClipRect
SetBkMode
GetDeviceCaps
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetObjectA
SetBkColor
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
CreateDIBitmap
PatBlt
GetTextExtentPointA
BitBlt
CreateCompatibleDC
CreateBitmap
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCreateKeyExA
RegCloseKey
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
shell32
ShellExecuteA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
comctl32
ord17
ole32
CoInitialize
CoUninitialize
CoCreateInstance
Sections
.text Size: 100KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
patch.exe.exe windows:6 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
LoadLi Size: 4KB - Virtual size: 1830.1MB
Size: 572KB - Virtual size: 4B
���� Size: - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA