Static task
static1
Behavioral task
behavioral1
Sample
05af0cf40590aef24b28fa04c6b4998b7ab3b7f26e60c507adb84f3d837778f2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
05af0cf40590aef24b28fa04c6b4998b7ab3b7f26e60c507adb84f3d837778f2.exe
Resource
win10v2004-20240226-en
General
-
Target
bcdbfc2e3ce5044763448bed642e7516230b6bdac839bad93dc6dff608de29a4
-
Size
461KB
-
MD5
908c98a70eaeb6054cf531d6a7165bb2
-
SHA1
396d9a0f1f57451d7c86238e44f6790e2fba05b9
-
SHA256
bcdbfc2e3ce5044763448bed642e7516230b6bdac839bad93dc6dff608de29a4
-
SHA512
39fd0248414fb708f6f78a92e511c07c61d4c6cc539b9aa5130c458799b16695240e468d4174ca232cabc017347be4a2eb76a26661cb3bfd2de3e73d0b122413
-
SSDEEP
12288:AR6uAYTN3Iya5D9kTs82KQ14uOhE3vK8R70uHcspDQAfe5z7mF:ARP3YR9T4mcW/KUjy5z7mF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/05af0cf40590aef24b28fa04c6b4998b7ab3b7f26e60c507adb84f3d837778f2
Files
-
bcdbfc2e3ce5044763448bed642e7516230b6bdac839bad93dc6dff608de29a4.zip
Password: infected
-
05af0cf40590aef24b28fa04c6b4998b7ab3b7f26e60c507adb84f3d837778f2.exe windows:6 windows x86 arch:x86
1156e59d43883136ef73eee451e94e3d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
GetFileSizeEx
GetFileAttributesW
SetFileAttributesW
SetFilePointerEx
MoveFileExW
FindFirstFileW
FindNextFileW
GetEnvironmentVariableW
FindClose
GetShortPathNameA
ReleaseMutex
GetUserDefaultLCID
GetCurrentThread
GetThreadContext
IsDebuggerPresent
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
GetCurrentProcess
GetTickCount
OpenMutexW
CopyFileW
CreateProcessW
GetProcessHeap
HeapAlloc
CloseHandle
Process32FirstW
Process32NextW
GetLastError
Sleep
CreateToolhelp32Snapshot
OpenProcess
CreateFileW
CreateMutexW
GetModuleFileNameW
TerminateProcess
HeapFree
WideCharToMultiByte
MultiByteToWideChar
FindNextVolumeW
GetVolumePathNamesForVolumeNameW
FindVolumeClose
SetVolumeMountPointW
FindFirstVolumeW
WriteConsoleW
SetEndOfFile
HeapSize
ReadConsoleW
FlushFileBuffers
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
ReleaseSemaphore
DuplicateHandle
VirtualFree
VirtualProtect
VirtualAlloc
IsValidCodePage
GetVersionExW
LoadLibraryExW
GetModuleHandleA
FreeLibraryAndExitThread
UnregisterWaitEx
WaitForSingleObject
WriteFile
FindFirstFileExW
HeapReAlloc
GetConsoleMode
GetConsoleCP
SetStdHandle
DeleteFileW
GetFileType
EnumSystemLocalesW
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetTimeZoneInformation
QueryDosDeviceW
GetLogicalDrives
GetStdHandle
FreeLibrary
ExitProcess
RtlUnwind
LoadLibraryW
RaiseException
GetCurrentThreadId
IsProcessorFeaturePresent
QueueUserWorkItem
GetModuleHandleExW
FormatMessageW
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
DeleteCriticalSection
QueryPerformanceCounter
QueryPerformanceFrequency
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
WaitForSingleObjectEx
EncodePointer
DecodePointer
GetStringTypeW
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetEvent
ResetEvent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
LocalFree
CreateTimerQueue
SignalObjectAndWait
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
user32
GetKeyboardLayout
SystemParametersInfoW
advapi32
ControlService
OpenServiceW
CryptSetKeyParam
CryptDestroyKey
CryptAcquireContextW
CryptEncrypt
CryptDuplicateKey
CryptExportKey
CryptImportKey
CryptGenKey
CryptReleaseContext
OpenProcessToken
GetTokenInformation
RegCloseKey
CloseServiceHandle
OpenSCManagerW
DeleteService
RegCreateKeyW
EnumDependentServicesW
RegSetValueExW
StartServiceW
RegOpenKeyExW
QueryServiceStatusEx
shell32
SHGetSpecialFolderPathA
SHEmptyRecycleBinW
ole32
CoUninitialize
CoInitializeEx
CoInitialize
IIDFromString
CLSIDFromString
CoGetObject
CoCreateInstance
CoInitializeSecurity
oleaut32
SysFreeString
VariantInit
SysAllocStringByteLen
SysAllocString
VariantClear
SysStringByteLen
mpr
WNetGetConnectionW
netapi32
NetShareEnum
NetApiBufferFree
iphlpapi
SendARP
ws2_32
WSACleanup
gethostbyname
WSAStartup
inet_addr
gethostname
inet_ntoa
rstrtmgr
RmRegisterResources
RmGetList
RmStartSession
RmShutdown
RmEndSession
crypt32
CryptStringToBinaryA
wininet
InternetConnectW
HttpOpenRequestW
InternetCloseHandle
HttpSendRequestW
InternetReadFile
HttpSendRequestA
InternetOpenW
Sections
.text Size: 568KB - Virtual size: 567KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 419KB - Virtual size: 419KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 30KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ