TaretxopnnevnNtitx
Static task
static1
Behavioral task
behavioral1
Sample
$R0JXIIA.rar
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
$R0JXIIA.rar
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
aclui.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
aclui.dll
Resource
win10v2004-20231215-en
General
-
Target
MDE_File_Sample_68bf4dad0647fe53f9624358c4427ff048e20801.zip
-
Size
2.6MB
-
MD5
8748bdf0c7698015d07a697c55b5d90a
-
SHA1
d2306166ecec438a54b0fa01a95859d25cd9c582
-
SHA256
245932d740dd468020c4c06e7a302b7273868156081b70376f30f39bd9168b46
-
SHA512
85a6daf22d820470e9bdbf31bd630588e49d0caa5a08428438cd7e51c3ec1fa730b42548e33450980cf2b53d73ef8855f471fe9ce3c8a65969ba52f3fdc87125
-
SSDEEP
49152:tcmLz6UImo1Borgx0c28bJoX/z4TRH8tzfQBm0mGUPFe/D4BNm69p53Qoxz9iROX:im6UImo1BegY84Yd6zfAW8DKBj/zEROX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack002/aclui.dll
Files
-
MDE_File_Sample_68bf4dad0647fe53f9624358c4427ff048e20801.zip.zip
Password: f21
-
$R0JXIIA.rar.rar
-
aclui.dll.dll windows:5 windows x86 arch:x86
Password: f21
28ea788f389fd760c27129551763b161
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
winspool.drv
EnumPrinterKeyW
rpcrt4
RpcBindingFromStringBindingW
I_RpcFree
I_RpcReceive
RpcUserFree
crypt32
CryptSIPGetSignedDataMsg
oleaut32
SafeArrayUnlock
SysAllocStringByteLen
winmm
timeGetDevCaps
iphlpapi
IcmpSendEcho2
NhpAllocateAndGetInterfaceInfoFromStack
shlwapi
ColorHLSToRGB
shell32
SHBrowseForFolderW
secur32
QueryContextAttributesW
ws2_32
select
setupapi
SetupDiGetDriverInfoDetailA
SetupDiGetDeviceInterfaceAlias
SetupAddToSourceListW
msvcrt
putc
iswctype
memset
wininet
HttpEndRequestW
user32
GetClipCursor
TrackPopupMenuEx
CreateIconFromResourceEx
FindWindowExW
PaintDesktop
VkKeyScanW
GetQueueStatus
CreateWindowExA
GetUpdateRgn
LoadAcceleratorsW
PostQuitMessage
ToUnicodeEx
MonitorFromPoint
WindowFromPoint
ScreenToClient
kernel32
SwitchToThread
LocalLock
PostQueuedCompletionStatus
GetCurrentProcess
SetCommMask
GlobalMemoryStatusEx
LocalFileTimeToFileTime
GetQueuedCompletionStatus
UnregisterWaitEx
GetThreadPriority
LocalFlags
GetModuleHandleA
GetBinaryTypeA
GetModuleFileNameA
GetProcAddress
LoadLibraryA
GetModuleFileNameW
DeleteCriticalSection
GetExitCodeProcess
WaitForSingleObjectEx
MapViewOfFileEx
GetSystemDefaultUILanguage
EnterCriticalSection
InterlockedFlushSList
InterlockedPushEntrySList
wintrust
CryptCATPersistStore
CryptCATOpen
gdi32
SetBitmapDimensionEx
CombineRgn
SelectPalette
GetCurrentPositionEx
GetWindowExtEx
CreateCompatibleBitmap
SetICMProfileA
advapi32
RegOpenCurrentUser
GetEffectiveRightsFromAclW
mprapi
MprAdminServerDisconnect
ntdsapi
DsListSitesW
ole32
ReadFmtUserTypeStg
CLIPFORMAT_UserMarshal
CoCancelCall
CoIsHandlerConnected
esent
JetCommitTransaction
Exports
Exports
Sections
.text Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
2*s+PkG Size: 568KB - Virtual size: 564KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
5QwK*98 Size: 336KB - Virtual size: 335KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
dkx Size: 100KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
7Hoy Size: 320KB - Virtual size: 318KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
H Size: 196KB - Virtual size: 193KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ