Static task
static1
Behavioral task
behavioral1
Sample
0be0d1c35399fa85d3f133465620eabdc899e367179b7b385aec75e66865389f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0be0d1c35399fa85d3f133465620eabdc899e367179b7b385aec75e66865389f.exe
Resource
win10v2004-20240226-en
General
-
Target
6da0f33f479b843fb743b6fcd7f6f827.bin
-
Size
796KB
-
MD5
7dc18a73f88cc8f47cbc4da7bf54f96f
-
SHA1
35182e901cee203b5ff889668cb8d53b29d7c89e
-
SHA256
bf1d867d9ca5fbd96e3a7dbad3ce316f4076a08a15c72c7e42779fcedb244997
-
SHA512
017eb2bc570fc53e471792384958c158885609a488bc8c58b2e6804c11732887acdc133664b1c57bbfd1218c8638b7862fd662de826289f2b46e939077a90a60
-
SSDEEP
24576:vekTS/BhcccEdOZXBKn4HjaNdnPbNbvED:WkmBh54ZXBK4DEdTpED
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/0be0d1c35399fa85d3f133465620eabdc899e367179b7b385aec75e66865389f.exe
Files
-
6da0f33f479b843fb743b6fcd7f6f827.bin.zip
Password: infected
-
0be0d1c35399fa85d3f133465620eabdc899e367179b7b385aec75e66865389f.exe.exe windows:5 windows x86 arch:x86
Password: infected
656e4782cc18931342281e8311ff00f5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapReAlloc
RtlUnwind
RaiseException
ExitProcess
HeapSize
SetStdHandle
GetFileType
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetFileSizeEx
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
LCMapStringA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
GetStartupInfoW
CreateFileW
GetFullPathNameW
GetVolumeInformationW
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
GetCurrentThread
SetErrorMode
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
CompareStringA
InterlockedExchange
GetThreadLocale
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
GetVersionExW
CompareStringW
LoadLibraryA
lstrcmpW
GetModuleHandleW
GetVersionExA
GetCurrentProcessId
GetFileTime
GetModuleHandleA
SetLastError
GlobalFree
FormatMessageW
LocalFree
MulDiv
FreeResource
GlobalUnlock
GlobalLock
GlobalAlloc
GetModuleFileNameW
lstrlenA
GetTickCount
FreeLibrary
lstrlenW
GetLastError
LoadLibraryW
WideCharToMultiByte
GetProcAddress
WaitForSingleObject
ResetEvent
Sleep
FindClose
FindNextFileW
DeleteFileW
RemoveDirectoryW
SetFileAttributesW
GetFileAttributesW
FindFirstFileW
Process32NextW
SetProcessWorkingSetSize
OpenProcess
Process32FirstW
CreateToolhelp32Snapshot
CreateThread
MultiByteToWideChar
CreateEventW
CloseHandle
GetCurrentProcess
InterlockedDecrement
InterlockedIncrement
IsBadWritePtr
WritePrivateProfileStringW
GetPrivateProfileIntW
GetPrivateProfileStringW
FindResourceW
LoadResource
LockResource
GetCPInfo
SizeofResource
user32
IsRectEmpty
CopyAcceleratorTableW
GetSysColorBrush
WindowFromPoint
GetMessageW
ValidateRect
RegisterClipboardFormatW
SetWindowContextHelpId
MapDialogRect
PostQuitMessage
DestroyMenu
CharNextW
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
EnableMenuItem
MapVirtualKeyW
GetKeyNameTextW
RegisterWindowMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
GetKeyState
SetMenu
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
EqualRect
DefWindowProcW
CallWindowProcW
GetMenu
OffsetRect
SystemParametersInfoA
GetWindowPlacement
GetWindowTextW
GetFocus
SetFocus
GetDlgCtrlID
SetWindowTextW
IsDialogMessageW
SendDlgItemMessageW
GetWindow
GetWindowThreadProcessId
GetLastActivePopup
GetSysColor
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
GetDlgItem
IsWindowEnabled
GetParent
GetNextDlgTabItem
EndDialog
GetMenuState
GetMenuItemID
GetMenuItemCount
CharUpperW
CopyRect
DispatchMessageW
PostThreadMessageW
MessageBeep
GetNextDlgGroupItem
SetCapture
UnregisterClassW
TranslateMessage
AdjustWindowRectEx
InvalidateRgn
PeekMessageW
TrackPopupMenu
ScreenToClient
SystemParametersInfoW
GetClientRect
UpdateWindow
KillTimer
IsWindow
IsWindowVisible
MoveWindow
MessageBoxW
SetCursor
CheckMenuItem
GetSubMenu
GetCursorPos
LoadMenuW
SetForegroundWindow
IsIconic
ReleaseCapture
ReleaseDC
UpdateLayeredWindow
SetWindowLongW
GetWindowLongW
GetDC
SetRect
SetTimer
GetSystemMetrics
LoadIconW
PostMessageW
ShowWindow
SetWindowPos
GetWindowRect
SetParent
LoadCursorW
EnableWindow
RegisterHotKey
UnregisterHotKey
InvalidateRect
PtInRect
SendMessageW
IntersectRect
gdi32
TextOutW
CreateFontIndirectW
CreateRectRgnIndirect
GetStockObject
DPtoLP
GetBkColor
GetTextColor
GetRgnBox
CreateBitmap
RectVisible
PtVisible
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
GetMapMode
CreateCompatibleDC
GetWindowExtEx
GetViewportExtEx
GetObjectW
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
DeleteDC
DeleteObject
SelectObject
CreateDIBSection
BitBlt
CreateCompatibleBitmap
ExtTextOutW
comdlg32
GetFileTitleW
winspool.drv
OpenPrinterW
DocumentPropertiesW
ClosePrinter
advapi32
RegEnumKeyW
RegSetValueExW
RegCreateKeyExW
RegQueryValueW
RegOpenKeyW
OpenProcessToken
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
AdjustTokenPrivileges
LookupPrivilegeValueW
shell32
Shell_NotifyIconW
SHGetSpecialFolderPathW
ShellExecuteW
comctl32
_TrackMouseEvent
shlwapi
PathFindFileNameW
UrlUnescapeW
PathStripToRootW
PathIsUNCW
PathFindExtensionW
oledlg
OleUIBusyW
ole32
CoTaskMemAlloc
CreateStreamOnHGlobal
CoTaskMemFree
CLSIDFromProgID
CoFreeUnusedLibraries
CLSIDFromString
OleUninitialize
OleInitialize
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoRevokeClassObject
oleaut32
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantCopy
OleCreateFontIndirect
VariantChangeType
VariantInit
SysAllocStringLen
VariantClear
SysAllocString
SysStringLen
SysFreeString
wininet
InternetSetStatusCallbackW
InternetOpenW
InternetGetLastResponseInfoW
InternetCloseHandle
HttpAddRequestHeadersW
InternetQueryDataAvailable
HttpOpenRequestW
InternetConnectW
InternetSetFilePointer
HttpSendRequestW
InternetReadFile
InternetWriteFile
FindFirstUrlCacheEntryW
DeleteUrlCacheEntryW
FindNextUrlCacheEntryW
InternetCrackUrlW
InternetCanonicalizeUrlW
gdiplus
GdiplusStartup
GdipDisposeImage
GdipCloneImage
GdipLoadImageFromStream
GdipDrawImageRectRect
GdipDrawImageRectI
GdipReleaseDC
GdipGetImageHeight
GdipGetImageWidth
GdipDeleteFont
GdipDeleteFontFamily
GdipCloneBrush
GdipDeleteBrush
GdipCreateSolidFill
GdipAlloc
GdipFree
GdipCreateFontFamilyFromName
GdipCreateFont
GdipCreateFromHDC
GdipDeleteGraphics
GdipCreateStringFormat
GdipDeleteStringFormat
GdipSetTextRenderingHint
GdipDrawImageRectRectI
GdipDrawString
psapi
EmptyWorkingSet
iphlpapi
GetAdaptersInfo
GetAdaptersAddresses
netapi32
Netbios
snmpapi
SnmpUtilOidCpy
SnmpUtilOidNCmp
SnmpUtilVarBindFree
ws2_32
WSAStartup
Sections
.text Size: 281KB - Virtual size: 281KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 628KB - Virtual size: 627KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ