Static task
static1
Behavioral task
behavioral1
Sample
b98a835c6239c63a6ada26b92a4605264a9a36130bebe288b21c51edd750dea2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b98a835c6239c63a6ada26b92a4605264a9a36130bebe288b21c51edd750dea2.exe
Resource
win10v2004-20240226-en
General
-
Target
b98a835c6239c63a6ada26b92a4605264a9a36130bebe288b21c51edd750dea2.zip
-
Size
574KB
-
MD5
5988b0650d2ad01c38c2d38f69a8b9ea
-
SHA1
45785645716a15e7b4cf1f0cc2c7d0f3a935babe
-
SHA256
184225d32f009eac819fe31bb156c30e53a9cab4dac30a7735cd58f5aa5adf8a
-
SHA512
5e211f8b5e756757ee6b1cd9ff51b158bfa8575a14b5ce6880d1fa76d088f43a85dd889643d08ee693ff59885b5959aeee855663c5d5428a76bf81a43f4de285
-
SSDEEP
12288:x/SsozwUPS4IuXHqBzq3qoIOC9M3Do/fW4tisB+f/mdcGfYUVRdaNVSexoLY:xa/c4S41HSzq7NCko/fWrscGfYW/aNV9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/b98a835c6239c63a6ada26b92a4605264a9a36130bebe288b21c51edd750dea2
Files
-
b98a835c6239c63a6ada26b92a4605264a9a36130bebe288b21c51edd750dea2.zip.zip
Password: threatbook
-
b98a835c6239c63a6ada26b92a4605264a9a36130bebe288b21c51edd750dea2.exe windows:5 windows x86 arch:x86
Password: threatbook
a8519b43707332757c1b21df993e1c86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
InitializeCriticalSection
InterlockedDecrement
GetLongPathNameW
GetTempPathW
LockResource
TlsAlloc
GetEnvironmentStrings
EnumSystemLocalesA
LocalUnlock
ExpandEnvironmentStringsW
GetTimeFormatA
GetStartupInfoA
ReadFile
GetLocaleInfoW
WriteConsoleW
TlsGetValue
SizeofResource
UnhandledExceptionFilter
FileTimeToSystemTime
LeaveCriticalSection
InterlockedIncrement
GetCommandLineA
GetModuleFileNameW
GetSystemTimeAsFileTime
MultiByteToWideChar
GetFileType
GetEnvironmentStringsW
GetDriveTypeW
FreeEnvironmentStringsW
IsValidCodePage
GlobalFree
SetUnhandledExceptionFilter
LocalAlloc
CreateMutexW
MulDiv
WriteFile
lstrcpyW
GetCurrentDirectoryA
SetCurrentDirectoryW
GetCurrentDirectoryW
lstrcatW
QueryPerformanceCounter
GetTimeFormatW
SetFileAttributesW
SetEnvironmentVariableA
Sleep
LocalFree
EnterCriticalSection
FindFirstFileW
GetDriveTypeA
ReleaseMutex
GetConsoleMode
GetModuleHandleW
GlobalUnlock
GetFileSize
LoadLibraryA
AddAtomW
VirtualProtect
HeapReAlloc
GetCurrentProcessId
CreateFileW
HeapSize
CreateThread
GetLocalTime
GetFullPathNameW
WaitForSingleObject
GetProcAddress
InterlockedExchange
GetConsoleOutputCP
GetCPInfo
SetStdHandle
GlobalLock
HeapCreate
FindResourceW
CopyFileW
LoadResource
SetHandleCount
GetCommandLineW
GetFileAttributesW
GetACP
CreateDirectoryW
GetStdHandle
RaiseException
MoveFileW
CompareStringW
WideCharToMultiByte
lstrlenW
TlsSetValue
GetTimeZoneInformation
GetLastError
FreeLibrary
RtlUnwind
InterlockedCompareExchange
FileTimeToLocalFileTime
GetStringTypeA
WriteConsoleA
TerminateThread
CompareStringA
FlushFileBuffers
DeleteCriticalSection
DeleteFileW
TerminateProcess
SetEndOfFile
IsDebuggerPresent
FindClose
GetOEMCP
GlobalAlloc
IsValidLocale
lstrcmpW
FindNextFileW
GetCurrentProcess
ExitProcess
FreeEnvironmentStringsA
GetLocaleInfoA
CloseHandle
LCMapStringA
lstrcpynW
TlsFree
lstrcmpiW
HeapDestroy
GetSystemInfo
GetUserDefaultLCID
SetFilePointer
SetLastError
GetConsoleCP
user32
TrackPopupMenu
MonitorFromWindow
GetDlgCtrlID
SetCapture
SystemParametersInfoW
DestroyWindow
CreateDialogIndirectParamW
RedrawWindow
GetSubMenu
InsertMenuW
GetWindowPlacement
MessageBoxA
SetWindowsHookExW
CharUpperW
DestroyIcon
CloseClipboard
MessageBoxW
RemoveMenu
EndDeferWindowPos
DeleteMenu
CallWindowProcW
UnhookWindowsHookEx
wsprintfW
ChangeClipboardChain
GetMenuState
HideCaret
CreateDialogParamW
SetClipboardData
SetPropW
DialogBoxParamW
GetClassNameW
GetMessageW
ClientToScreen
SetWindowLongW
AppendMenuW
SetParent
BeginDeferWindowPos
GetMenuItemCount
PostMessageW
SetFocus
GetScrollRange
SetDlgItemTextW
SetWindowTextW
ShowWindow
RegisterClassExW
GetCapture
MoveWindow
IsDialogMessageA
GetFocus
DeferWindowPos
CreatePopupMenu
CreateCaret
InflateRect
GetDlgItem
FrameRect
SetMenu
FlashWindowEx
GetMenuStringW
GetMenu
DestroyMenu
GetClipboardData
GetDlgItemTextW
GetMenuItemID
IsDialogMessageW
SendMessageW
ScreenToClient
CreateWindowExW
DrawTextExW
EnableWindow
GetMessageA
SetCursor
CharLowerW
LoadCursorW
LoadStringW
BeginPaint
SendMessageA
MapWindowPoints
UpdateWindow
SetClipboardViewer
TranslateAcceleratorW
ModifyMenuW
ScrollWindow
EmptyClipboard
CreateAcceleratorTableW
DrawIcon
GetScrollPos
DispatchMessageW
IsZoomed
SetScrollPos
DrawMenuBar
ShowCursor
DrawTextW
PeekMessageW
GetDCEx
LoadMenuW
WindowFromPoint
GetCursorPos
RemovePropW
GetParent
GetDesktopWindow
GetWindowRect
SendDlgItemMessageW
RegisterWindowMessageW
EndPaint
ShowScrollBar
RegisterClipboardFormatW
PostQuitMessage
DrawFocusRect
FillRect
CheckMenuItem
DialogBoxIndirectParamW
MessageBeep
InsertMenuItemW
InvalidateRect
IsClipboardFormatAvailable
GetMonitorInfoW
GetActiveWindow
ReleaseDC
FindWindowW
GetKeyboardState
RegisterClassW
DrawFrameControl
IsChild
DestroyAcceleratorTable
SetMenuItemInfoW
SetCaretPos
GetKeyState
IsWindowVisible
DrawEdge
GetDC
CallNextHookEx
LoadImageW
ShowCaret
ReleaseCapture
IsWindow
IsWindowUnicode
LoadBitmapW
DragDetect
GetSysColor
CheckMenuRadioItem
EnableMenuItem
OpenClipboard
SetWindowLongA
IsIconic
SetScrollRange
LockWindowUpdate
DestroyCaret
CreateCursor
DefWindowProcW
SetForegroundWindow
GetWindowTextW
SetWindowPos
GetClientRect
SetScrollInfo
ToAscii
LoadIconW
GetPropW
CallWindowProcA
GetDlgItemInt
EndDialog
SetDlgItemInt
DestroyCursor
DrawIconEx
RealChildWindowFromPoint
GetSystemMetrics
GetWindowLongW
CreateMenu
TranslateMessage
gdi32
PatBlt
MoveToEx
CreateFontW
CreateFontIndirectW
SaveDC
EnumFontFamiliesExW
EndDoc
GetObjectW
DeleteDC
GetROP2
CreatePen
GetTextExtentPointW
GetDeviceCaps
Rectangle
EndPage
DPtoLP
SetBkMode
GetStockObject
GetTextExtentPoint32W
RestoreDC
SetBrushOrgEx
SetBkColor
ExtTextOutW
GetPixel
SetTextAlign
CreateCompatibleBitmap
LineTo
CreateCompatibleDC
CreatePatternBrush
SelectObject
CreateBitmap
SetWindowOrgEx
CreateHatchBrush
StartDocW
SetROP2
CreateSolidBrush
StartPage
SetTextColor
GetTextMetricsW
BitBlt
DeleteObject
OffsetWindowOrgEx
comdlg32
GetSaveFileNameW
GetOpenFileNameW
ChooseColorW
PrintDlgW
shell32
SHBrowseForFolderW
DragQueryFileW
DragFinish
DragQueryPoint
SHGetPathFromIDListW
SHGetMalloc
ShellExecuteW
SHGetSpecialFolderLocation
Shell_NotifyIconW
SHFileOperationW
ole32
CoInitialize
CoUninitialize
comctl32
ImageList_BeginDrag
ImageList_EndDrag
ImageList_DragEnter
ord17
ImageList_Add
ImageList_DragMove
_TrackMouseEvent
ImageList_GetImageInfo
ImageList_ReplaceIcon
ImageList_Create
ImageList_DragShowNolock
ImageList_AddMasked
InitCommonControlsEx
ImageList_Draw
ImageList_GetImageCount
ImageList_Destroy
ImageList_SetIconSize
shlwapi
PathFindFileNameW
PathAppendW
PathStripPathW
PathGetDriveNumberW
PathIsDirectoryW
PathFileExistsW
PathAddExtensionW
PathFindExtensionW
PathRemoveExtensionW
PathMatchSpecW
PathRemoveFileSpecW
PathIsRelativeW
PathCompactPathExW
msvcrt
isalpha
free
malloc
atoi
fopen
_CIsin
isdigit
__set_app_type
Sections
.text Size: 157KB - Virtual size: 156KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.fg15 Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.BSS3 Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 115KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 175KB - Virtual size: 175KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 154KB - Virtual size: 154KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ