Static task
static1
Behavioral task
behavioral1
Sample
67c0293f1073d9c5e96fba1b67e120f2358dd6ceb3db96ef897ef407b62ae842.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
67c0293f1073d9c5e96fba1b67e120f2358dd6ceb3db96ef897ef407b62ae842.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/BgImage.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/BgImage.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
General
-
Target
5ed7756bd8f1424e59de908c21ee2c39.bin
-
Size
711KB
-
MD5
86cc71a702831029f68f1d3877a1e8ef
-
SHA1
da3275384d41ebc5838f97289eb32ad2c65acd35
-
SHA256
55e2ebdd39c3d6a44cec4e15cf60ac7f68ff7cc768d83201930dbbc9fc4773a0
-
SHA512
0915e2e2b9f89cbaa21a405497a347b0115e4f9c899be6ea07a85a89e2c2d598fc337f75388509764f93720bda61f469e08cef43220b0247b6d684c60de14c77
-
SSDEEP
12288:gGkp+rF3Cl66S2lwNhON/BUbBc7/ipV0hOETZvwOhU4EH59E/CWJ4I:FUl66LwNh/bBc3TZvwOTEH/7WJf
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack002/$PLUGINSDIR/BgImage.dll unpack002/$PLUGINSDIR/System.dll
Files
-
5ed7756bd8f1424e59de908c21ee2c39.bin.zip
Password: infected
-
67c0293f1073d9c5e96fba1b67e120f2358dd6ceb3db96ef897ef407b62ae842.exe.exe windows:4 windows x86 arch:x86
Password: infected
1f23f452093b5c1ff091a2f9fb4fa3e9
Code Sign
45:a2:29:14:a6:34:42:18:18:00:7b:21:99:63:f5:34:9b:2d:d6:b8Certificate
IssuerCN=Commercially,OU=Hoppy Filigreing Transporten\ ,O=Commercially,L=Easton,ST=Missouri,C=US,1.2.840.113549.1.9.1=#0c1f63696e63686f6e6163656f757340456c656b7472696b6572656e732e447261Not Before31-10-2023 04:34Not After30-10-2026 04:34SubjectCN=Commercially,OU=Hoppy Filigreing Transporten\ ,O=Commercially,L=Easton,ST=Missouri,C=US,1.2.840.113549.1.9.1=#0c1f63696e63686f6e6163656f757340456c656b7472696b6572656e732e44726145:a2:29:14:a6:34:42:18:18:00:7b:21:99:63:f5:34:9b:2d:d6:b8Certificate
IssuerCN=Commercially,OU=Hoppy Filigreing Transporten\ ,O=Commercially,L=Easton,ST=Missouri,C=US,1.2.840.113549.1.9.1=#0c1f63696e63686f6e6163656f757340456c656b7472696b6572656e732e447261Not Before31-10-2023 04:34Not After30-10-2026 04:34SubjectCN=Commercially,OU=Hoppy Filigreing Transporten\ ,O=Commercially,L=Easton,ST=Missouri,C=US,1.2.840.113549.1.9.1=#0c1f63696e63686f6e6163656f757340456c656b7472696b6572656e732e447261fa:5a:58:22:42:f2:b4:7f:b2:ed:92:8c:08:2e:c3:e0:05:c2:f1:00:9b:cb:26:79:d4:4e:20:4e:58:e0:a1:bdSigner
Actual PE Digestfa:5a:58:22:42:f2:b4:7f:b2:ed:92:8c:08:2e:c3:e0:05:c2:f1:00:9b:cb:26:79:d4:4e:20:4e:58:e0:a1:bdDigest Algorithmsha256PE Digest Matchestruebd:d4:49:51:8a:46:c7:f2:c7:3f:ea:27:62:f8:ac:f2:f0:c1:df:c0Signer
Actual PE Digestbd:d4:49:51:8a:46:c7:f2:c7:3f:ea:27:62:f8:ac:f2:f0:c1:df:c0Digest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
SetFileAttributesW
Sleep
GetTickCount
CreateFileW
GetFileSize
GetModuleFileNameW
GetCurrentProcess
SetCurrentDirectoryW
GetFileAttributesW
SetEnvironmentVariableW
GetWindowsDirectoryW
GetTempPathW
GetCommandLineW
GetVersion
SetErrorMode
lstrlenW
lstrcpynW
CopyFileW
GetShortPathNameW
GlobalLock
CreateThread
GetLastError
CreateDirectoryW
CreateProcessW
RemoveDirectoryW
lstrcmpiA
GetTempFileNameW
WriteFile
lstrcpyA
MoveFileExW
lstrcatW
GetSystemDirectoryW
GetProcAddress
GetModuleHandleA
GetExitCodeProcess
WaitForSingleObject
lstrcmpiW
MoveFileW
GetFullPathNameW
SetFileTime
SearchPathW
CompareFileTime
lstrcmpW
CloseHandle
ExpandEnvironmentStringsW
GlobalFree
GlobalUnlock
GetDiskFreeSpaceW
GlobalAlloc
FindFirstFileW
FindNextFileW
DeleteFileW
SetFilePointer
ReadFile
FindClose
lstrlenA
MulDiv
MultiByteToWideChar
WideCharToMultiByte
GetPrivateProfileStringW
WritePrivateProfileStringW
FreeLibrary
LoadLibraryExW
GetModuleHandleW
user32
GetSystemMenu
SetClassLongW
EnableMenuItem
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongW
SetCursor
LoadCursorW
CheckDlgButton
GetMessagePos
LoadBitmapW
CallWindowProcW
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
ScreenToClient
GetWindowRect
GetDlgItem
GetSystemMetrics
SetDlgItemTextW
GetDlgItemTextW
MessageBoxIndirectW
CharPrevW
CharNextA
wsprintfA
DispatchMessageW
PeekMessageW
ReleaseDC
EnableWindow
InvalidateRect
SendMessageW
DefWindowProcW
BeginPaint
GetClientRect
FillRect
DrawTextW
EndDialog
RegisterClassW
SystemParametersInfoW
CreateWindowExW
GetClassInfoW
DialogBoxParamW
CharNextW
ExitWindowsEx
DestroyWindow
GetDC
SetTimer
SetWindowTextW
LoadImageW
SetForegroundWindow
ShowWindow
IsWindow
SetWindowLongW
FindWindowExW
TrackPopupMenu
AppendMenuW
CreatePopupMenu
EndPaint
CreateDialogParamW
SendMessageTimeoutW
wsprintfW
PostQuitMessage
gdi32
SelectObject
SetBkMode
CreateFontIndirectW
SetTextColor
DeleteObject
GetDeviceCaps
CreateBrushIndirect
SetBkColor
shell32
SHGetSpecialFolderLocation
ShellExecuteExW
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetFileInfoW
SHFileOperationW
advapi32
AdjustTokenPrivileges
RegCreateKeyExW
RegOpenKeyExW
SetFileSecurityW
OpenProcessToken
LookupPrivilegeValueW
RegEnumValueW
RegDeleteKeyW
RegDeleteValueW
RegCloseKey
RegSetValueExW
RegQueryValueExW
RegEnumKeyW
comctl32
ImageList_Create
ImageList_AddMasked
ImageList_Destroy
ord17
ole32
OleUninitialize
OleInitialize
CoTaskMemFree
CoCreateInstance
Sections
.text Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ndata Size: - Virtual size: 192KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
$PLUGINSDIR/BgImage.dll.dll windows:4 windows x86 arch:x86
Password: infected
32b0f5880a0efd258c6be2f7a14f4a9f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
InitializeCriticalSection
DeleteCriticalSection
lstrlenW
lstrcpyW
lstrcpynW
GlobalFree
lstrcmpiW
EnterCriticalSection
GlobalAlloc
LeaveCriticalSection
user32
UnregisterClassW
CallWindowProcW
LoadImageW
DestroyWindow
BeginPaint
IsWindow
SendMessageW
DefWindowProcW
RedrawWindow
ShowWindow
LoadCursorW
RegisterClassW
CreateWindowExW
SetWindowLongW
GetSystemMetrics
SetWindowPos
DrawTextW
EndPaint
FillRect
gdi32
GetObjectW
DeleteDC
DeleteObject
CreateSolidBrush
CreateCompatibleDC
SelectObject
SetMapMode
GetMapMode
CreateCompatibleBitmap
CreateBitmap
SetBkMode
BitBlt
DPtoLP
SetBkColor
SetTextColor
winmm
PlaySoundW
Exports
Exports
AddImage
AddText
Clear
Destroy
Redraw
SetBg
SetReturn
Sound
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 630B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
$PLUGINSDIR/System.dll.dll windows:4 windows x86 arch:x86
Password: infected
fc0224e99e736751432961db63a41b76
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetModuleHandleW
GlobalFree
GlobalSize
lstrcpynW
lstrcpyW
GetProcAddress
WideCharToMultiByte
VirtualFree
FreeLibrary
lstrlenW
LoadLibraryW
GlobalAlloc
MultiByteToWideChar
VirtualAlloc
VirtualProtect
GetLastError
user32
wsprintfW
ole32
StringFromGUID2
CLSIDFromString
Exports
Exports
Alloc
Call
Copy
Free
Get
Int64Op
Store
StrAlloc
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 851B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 120B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 608B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Apolitisk/Tangsprllene0/nonambiguity.taa
-
Consentant/Ikonologi/Solformrkelsens/Brugerfjendsk.klk
-
Kalligraferet/Milkweeds/Foderstoffers/grammatication/autocollimations.txt
-
Kalligraferet/Milkweeds/Foderstoffers/grammatication/malten.Sge
-
Sammensunken/Mintiest27/Ferierendes.Bos7
-
bevaringsvrdig/dioptidae/irreduction/bedrift.fac