Static task
static1
Behavioral task
behavioral1
Sample
Bonzify.exe
Resource
win7-20231215-en
General
-
Target
Trojan.Bonzify.zip
-
Size
5.5MB
-
MD5
2d3efe29a44d0ea6fa3697c135030e1a
-
SHA1
65d49e73ff1c432e9d95b009298f347de5ed828e
-
SHA256
4ca5ce97898d7770d1364e8b9006bef56383f5886b98888dedc7876283e9044a
-
SHA512
1180026727462504c426a0892f3561a5cc75a3d24cf84aca4dcf51f55c0d0245324ed0268a9e961b36acbad124fdfa65944146a5cd098d9c16efbabdb8cd2c4b
-
SSDEEP
98304:Kuv8hvcPgHmweG9abSwvQCFNeczP73i8muv2jO9mLnHJ9Bo3JHWXpQNLHE+nJ:Ky7Oe2aWcecr7F0O8LnpvsHSSk0J
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Bonzify.exe
Files
-
Trojan.Bonzify.zip.zip
Password: infected
-
Bonzify.exe.exe windows:5 windows x86 arch:x86
0bee32f8779ce7af7a869e923f1dd6fb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
lstrcmpA
lstrcatA
CreateFileA
lstrcpyA
CloseHandle
LocalFree
GetProcessHeap
FlushFileBuffers
Sleep
DeleteFileA
CreateThread
HeapAlloc
SizeofResource
lstrlenA
SetLastError
TerminateProcess
ExpandEnvironmentStringsA
GetFullPathNameA
FindResourceA
WaitForSingleObject
OpenProcess
CreateToolhelp32Snapshot
LockResource
Process32Next
LoadResource
lstrcmpiA
CreateProcessA
FindNextFileA
WriteFile
HeapFree
FindFirstFileA
Process32First
LocalAlloc
user32
SendMessageA
advapi32
RegOpenKeyA
RegSetValueExA
RegCloseKey
shell32
SHCreateDirectoryExA
SHChangeNotify
ole32
CoInitialize
CoCreateInstance
oleaut32
SysAllocString
SysFreeString
shlwapi
PathRemoveFileSpecA
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6.4MB - Virtual size: 6.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 452B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ