Static task
static1
Behavioral task
behavioral1
Sample
dfb53c35f9df19907c87436f950a7b3b12dea8b152fdeeaf025e1ff3a4e59df3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
dfb53c35f9df19907c87436f950a7b3b12dea8b152fdeeaf025e1ff3a4e59df3.exe
Resource
win10v2004-20231222-en
General
-
Target
dfb53c35f9df19907c87436f950a7b3b12dea8b152fdeeaf025e1ff3a4e59df3.exe.zip
-
Size
50.0MB
-
MD5
f5faf68262db11f964f163d8caf9402b
-
SHA1
90626d4d9148a87a65f47a489ca47d2cf8614b72
-
SHA256
92b064056658560daecdee654f5084bbcb5ac97c0c1c7cceaa4b443d8d454276
-
SHA512
af41deec0cebf52a26d5113c8ce5f6f6ea19594c1b88604afb617b288cb045945d7128b92d68384411ecf9bcbb2aa25727f958030d010f72c22a7c66e81139fe
-
SSDEEP
786432:6qHbzJ8yt9x08UbMH+g2bN+qF1kX5Dwwb+KbK4uRFfmm45cIMzaNnCrGFD9r0gTp:jHJ83rbP+p0M+g3uRkqIM4QGFD9r0wwM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/dfb53c35f9df19907c87436f950a7b3b12dea8b152fdeeaf025e1ff3a4e59df3.exe
Files
-
dfb53c35f9df19907c87436f950a7b3b12dea8b152fdeeaf025e1ff3a4e59df3.exe.zip.zip
Password: infected
-
dfb53c35f9df19907c87436f950a7b3b12dea8b152fdeeaf025e1ff3a4e59df3.exe.exe windows:4 windows x86 arch:x86
2b60d00c91710ec5162196c370dc8f7d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
wcsncpy
wcslen
wcscmp
memmove
wcscpy
wcscat
memcmp
strlen
strcpy
strcat
_stricmp
sprintf
malloc
free
_wstat
_wcsdup
strcmp
memcpy
strncpy
_wfopen
longjmp
_setjmp3
fclose
wcsncmp
floor
ceil
_snwprintf
_wcsicmp
tolower
_wcsnicmp
_wtoi
gmtime
localtime
mktime
_itow
fabs
fseek
ftell
fread
pow
??3@YAXPAX@Z
wcsstr
calloc
_lseeki64
_errno
realloc
abort
_close
_wopen
_setmode
exit
_open_osfhandle
strchr
_strdup
_snprintf
setlocale
strrchr
strncmp
wctomb
_get_osfhandle
_open
toupper
wcschr
mbstowcs
fopen
fflush
ferror
remove
strerror
frexp
modf
_CIpow
fwrite
atof
__p__iob
fprintf
getenv
sscanf
_vsnwprintf
cos
fmod
sin
abs
kernel32
GetModuleHandleW
HeapCreate
GetEnvironmentVariableW
HeapDestroy
ExitProcess
SystemTimeToFileTime
LocalFileTimeToFileTime
FindResourceW
LoadResource
LockResource
SizeofResource
CreateToolhelp32Snapshot
CloseHandle
GetLogicalDriveStringsW
QueryDosDeviceW
FileTimeToLocalFileTime
FileTimeToSystemTime
ExpandEnvironmentStringsW
GetCurrentProcess
GetUserDefaultLangID
GetSystemDefaultLangID
MultiByteToWideChar
GetProcAddress
CreateRemoteThread
WaitForSingleObject
GetExitCodeThread
GetCurrentProcessId
OpenProcess
GetLastError
FormatMessageW
GetVolumeInformationW
FindFirstFileW
FindNextFileW
FindClose
WideCharToMultiByte
BeginUpdateResourceW
UpdateResourceW
EndUpdateResourceW
CreateProcessW
Beep
CreateFileW
CreateSemaphoreW
DeviceIoControl
GetCommandLineW
GetComputerNameW
GetDateFormatW
GetDiskFreeSpaceExW
GetExitCodeProcess
GetFileTime
GetPrivateProfileStringW
GetShortPathNameW
GetSystemDirectoryW
GetSystemPowerStatus
GetTimeZoneInformation
GetUserDefaultLCID
GetWindowsDirectoryW
GlobalMemoryStatus
LocalFree
Process32FirstW
Process32NextW
QueryPerformanceCounter
QueryPerformanceFrequency
SetComputerNameW
SetFileTime
SetSystemTime
SetVolumeLabelW
Sleep
TerminateProcess
WritePrivateProfileStringW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
CreateThread
LoadLibraryW
FreeLibrary
GetCurrentThreadId
GetModuleFileNameW
DuplicateHandle
CreatePipe
GetStdHandle
HeapAlloc
HeapFree
PeekNamedPipe
SetEnvironmentVariableW
ReadFile
HeapReAlloc
GetFileSize
SetFilePointer
SetEndOfFile
WriteFile
DeleteFileW
TlsAlloc
TlsSetValue
GetTickCount
TlsGetValue
MulDiv
GetVersionExW
SetLastError
GetDriveTypeW
GetFileAttributesW
GetTempPathW
CreateDirectoryW
CopyFileW
SetFileAttributesW
RemoveDirectoryW
MoveFileW
GetLocalTime
HeapSize
TlsFree
DeleteCriticalSection
InterlockedCompareExchange
InterlockedExchange
VirtualAlloc
VirtualFree
IsValidCodePage
GetACP
GetOEMCP
GetFileType
GetFileInformationByHandle
GetFileAttributesA
CreateFileA
GetFullPathNameW
UnregisterWait
GetCurrentThread
RegisterWaitForSingleObject
gdiplus
GdipDeleteFont
GdipDeleteGraphics
GdipDeletePath
GdipDeleteMatrix
GdipDeletePen
GdipDeleteStringFormat
GdipFree
GdipGetDpiX
GdipGetDpiY
winspool.drv
ClosePrinter
DeletePrinter
OpenPrinterW
SetPrinterW
user32
SendMessageW
ReleaseDC
OemToCharW
EnumWindows
GetWindowThreadProcessId
FindWindowExW
FindWindowW
GetCursorPos
GetForegroundWindow
SetCursorPos
AnimateWindow
AttachThreadInput
BlockInput
ChangeDisplaySettingsW
CharToOemW
CreateWindowExW
DrawMenuBar
EnableMenuItem
EnableWindow
EnumDisplaySettingsW
ExitWindowsEx
FlashWindow
GetClassNameW
GetDC
GetDesktopWindow
GetFocus
GetKeyState
GetLastInputInfo
GetSysColor
GetSystemMenu
GetSystemMetrics
GetWindow
GetWindowLongW
GetWindowRect
GetWindowTextW
IsWindow
IsWindowEnabled
KillTimer
LoadCursorW
LockWorkStation
MessageBeep
PostMessageW
RegisterHotKey
RemoveMenu
SetClassLongW
SetFocus
SetForegroundWindow
SetTimer
SetWindowLongW
SetWindowPos
ShowWindow
UnregisterHotKey
UpdateWindow
WaitForInputIdle
keybd_event
mouse_event
MessageBoxW
IsWindowVisible
DestroyWindow
GetSysColorBrush
GetWindowTextLengthW
SetRect
DrawTextW
ValidateRect
CallWindowProcW
GetParent
MapWindowPoints
InvalidateRect
SetWindowTextW
RemovePropW
GetPropW
SetPropW
RedrawWindow
SetScrollPos
InflateRect
GetWindowDC
GetIconInfo
ReleaseCapture
BeginPaint
DrawStateW
EndPaint
SetCapture
ScreenToClient
DefWindowProcW
MoveWindow
SetActiveWindow
DestroyIcon
LoadIconW
RegisterClassW
AdjustWindowRectEx
CreateAcceleratorTableW
UnregisterClassW
PeekMessageW
MsgWaitForMultipleObjects
GetMessageW
GetActiveWindow
TranslateAcceleratorW
TranslateMessage
DispatchMessageW
DefFrameProcW
GetClientRect
FillRect
DestroyAcceleratorTable
EnumChildWindows
IsChild
RegisterWindowMessageW
CopyImage
CharUpperW
CharLowerW
DrawIconEx
gdi32
CreateDCW
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
DeleteDC
GetPixel
DeleteObject
GetStockObject
CreateFontW
SetTextColor
SetBkColor
GetTextExtentPoint32W
ExcludeClipRect
GetObjectType
GetObjectW
CreateSolidBrush
GetDeviceCaps
GdiGetBatchLimit
GdiSetBatchLimit
CreateDIBSection
CreateBitmap
SetPixel
GetDIBits
SetBkMode
SetTextAlign
TextOutW
SetStretchBltMode
SetBrushOrgEx
StretchBlt
CreateFontIndirectW
GetTextMetricsW
advapi32
RegOpenKeyExW
RegOpenKeyW
RegConnectRegistryW
RegQueryValueExW
RegCloseKey
RegDeleteKeyW
RegSetValueExW
RegCreateKeyExW
LookupAccountNameW
IsValidSid
RegEnumKeyExW
RegDeleteValueW
RegCreateKeyW
AdjustTokenPrivileges
ChangeServiceConfigW
CloseServiceHandle
ControlService
CryptAcquireContextW
CryptCreateHash
CryptDeriveKey
CryptDestroyHash
CryptDestroyKey
CryptEncrypt
CryptHashData
CryptReleaseContext
GetUserNameW
ImpersonateLoggedOnUser
LogonUserW
LookupPrivilegeValueW
OpenProcessToken
OpenSCManagerW
OpenServiceW
QueryServiceStatus
RegEnumValueW
RevertToSelf
StartServiceW
CryptGenRandom
comctl32
InitCommonControlsEx
oleaut32
SafeArrayGetDim
SafeArrayGetUBound
SafeArrayGetElement
ole32
CoInitializeEx
CoInitializeSecurity
CoCreateInstance
CoUninitialize
CoSetProxyBlanket
CoCreateGuid
CoInitialize
StringFromGUID2
CoTaskMemFree
RevokeDragDrop
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListW
ExtractIconExW
ExtractIconW
IsNetDrive
RealDriveType
SHAddToRecentDocs
SHFileOperationW
SHFormatDrive
SHGetFileInfoW
ShellAboutW
Shell_NotifyIconW
ShellExecuteExW
wsock32
WSAStartup
gethostbyname
WSACleanup
gethostbyaddr
inet_addr
closesocket
gethostname
htons
select
__WSAFDIsSet
ioctlsocket
recvfrom
socket
bind
connect
recv
winmm
timeBeginPeriod
icmp
IcmpCloseHandle
IcmpCreateFile
IcmpSendEcho
imagehlp
MakeSureDirectoryPathExists
iphlpapi
GetAdaptersInfo
GetNetworkParams
msi
MsiEnumProductsW
MsiGetProductInfoW
netapi32
NetApiBufferFree
NetLocalGroupAdd
NetLocalGroupDel
NetLocalGroupEnum
NetUserDel
NetUserGetInfo
NetUserSetInfo
setupapi
SetupIterateCabinetW
urlmon
URLDownloadToFileW
UrlMkSetSessionOption
userenv
GetDefaultUserProfileDirectoryW
wininet
DeleteUrlCacheEntryW
InternetCloseHandle
InternetGetConnectedState
InternetOpenUrlW
InternetOpenW
InternetReadFile
UnlockUrlCacheEntryFileW
Sections
.code Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 530KB - Virtual size: 529KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 81KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 49.5MB - Virtual size: 49.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 195KB - Virtual size: 195KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ