VisibleEntry
Overview
overview
10Static
static
1007117c02a0...99.dll
windows7-x64
107117c02a0...99.dll
windows10-2004-x64
11391c20a26...80.dll
windows7-x64
101391c20a26...80.dll
windows10-2004-x64
10350ba7fca6...bd.exe
windows7-x64
9350ba7fca6...bd.exe
windows10-2004-x64
1051eb749d6c...3e.dll
windows7-x64
351eb749d6c...3e.dll
windows10-2004-x64
1017205c4318...90.exe
windows7-x64
917205c4318...90.exe
windows10-2004-x64
95d2204f3a2...aa.exe
windows7-x64
5d2204f3a2...aa.exe
windows10-2004-x64
7883f01096...8a.exe
windows7-x64
107883f01096...8a.exe
windows10-2004-x64
10ae7c868713...6e.exe
windows7-x64
10ae7c868713...6e.exe
windows10-2004-x64
10Behavioral task
behavioral1
Sample
07117c02a09410f47a326b52c7f17407e63ba5e6ff97277446efc75b862d2799.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
07117c02a09410f47a326b52c7f17407e63ba5e6ff97277446efc75b862d2799.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
1391c20a26f248f7c602f20096bf1886cfe7e4d151602a1258a9bbe7c02c1c80.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
1391c20a26f248f7c602f20096bf1886cfe7e4d151602a1258a9bbe7c02c1c80.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
51eb749d6cbd08baf9d43c2f83abd9d4d86eb5206f62ba43b768251a98ce9d3e.dll
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
51eb749d6cbd08baf9d43c2f83abd9d4d86eb5206f62ba43b768251a98ce9d3e.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe
Resource
win10v2004-20240319-en
Behavioral task
behavioral13
Sample
7883f01096db9bcf090c2317749b6873036c27ba92451b212b8645770e1f0b8a.exe
Resource
win7-20240215-en
Behavioral task
behavioral14
Sample
7883f01096db9bcf090c2317749b6873036c27ba92451b212b8645770e1f0b8a.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
ae7c868713e1d02b4db60128c651eb1e3f6a33c02544cc4cb57c3aa6c6581b6e.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
ae7c868713e1d02b4db60128c651eb1e3f6a33c02544cc4cb57c3aa6c6581b6e.exe
Resource
win10v2004-20240226-en
General
-
Target
ca0273c55507c3aae95539812c2c5d9bbdc80deb8e714360fe4bcc65d257aeb0
-
Size
3.0MB
-
MD5
1bcea13bd6b7223e04ca71ee4b78647e
-
SHA1
32ae0e093011c1f5e4637d3cc081600ad6de2874
-
SHA256
ca0273c55507c3aae95539812c2c5d9bbdc80deb8e714360fe4bcc65d257aeb0
-
SHA512
426fe0b135e68e256aef76ad2a032911dcb979e5cde29c51ac4f960fe4305abbb3a3e3891cf2ec45aafb7dbeaffc5983b0072dbbcbba0b757ef14dd50c1fd8fc
-
SSDEEP
98304:7pZaH5gP6rItqsK3PFAK1x59fnwQXFpqug5fA:7J6r5b3+Kf59fw0fOy
Malware Config
Signatures
-
Black Basta payload 3 IoCs
Processes:
resource yara_rule static1/unpack007/5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa family_blackbasta static1/unpack008/7883f01096db9bcf090c2317749b6873036c27ba92451b212b8645770e1f0b8a family_blackbasta static1/unpack009/ae7c868713e1d02b4db60128c651eb1e3f6a33c02544cc4cb57c3aa6c6581b6e family_blackbasta -
Blackbasta family
-
Unsigned PE 7 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack002/07117c02a09410f47a326b52c7f17407e63ba5e6ff97277446efc75b862d2799 unpack003/1391c20a26f248f7c602f20096bf1886cfe7e4d151602a1258a9bbe7c02c1c80 unpack005/51eb749d6cbd08baf9d43c2f83abd9d4d86eb5206f62ba43b768251a98ce9d3e unpack006/17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90 unpack007/5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa unpack008/7883f01096db9bcf090c2317749b6873036c27ba92451b212b8645770e1f0b8a unpack009/ae7c868713e1d02b4db60128c651eb1e3f6a33c02544cc4cb57c3aa6c6581b6e
Files
-
ca0273c55507c3aae95539812c2c5d9bbdc80deb8e714360fe4bcc65d257aeb0.zip
-
07117c02a09410f47a326b52c7f17407e63ba5e6ff97277446efc75b862d2799.7z.7z
Password: infected
-
07117c02a09410f47a326b52c7f17407e63ba5e6ff97277446efc75b862d2799.dll windows:6 windows x86 arch:x86
49336329916f610627e1dfca1c33c427
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetTempPathW
GetLastError
CreateMutexW
OpenMutexW
CreateProcessA
GetTickCount
lstrcmpW
MultiByteToWideChar
CreateFileW
WriteFile
CloseHandle
FindNextFileW
ReadFile
WaitForSingleObject
CreateThread
MoveFileW
SetLastError
QueryPerformanceCounter
QueryPerformanceFrequency
SetEndOfFile
WriteConsoleW
SetStdHandle
FindFirstFileW
GetFileSizeEx
FindClose
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WaitForSingleObjectEx
Sleep
GetCurrentThreadId
GetNativeSystemInfo
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
TryEnterCriticalSection
DeleteCriticalSection
WideCharToMultiByte
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
EncodePointer
DecodePointer
LCMapStringEx
GetLocaleInfoEx
GetStringTypeW
CompareStringEx
GetCPInfo
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
CreateEventW
InitializeSListHead
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetCurrentProcessId
GetCurrentProcess
TerminateProcess
RaiseException
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
VirtualQuery
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
GetModuleFileNameW
HeapAlloc
HeapFree
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStdHandle
GetFileType
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
SetFilePointerEx
ReadConsoleW
HeapReAlloc
HeapSize
GetTimeZoneInformation
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
shell32
SHChangeNotify
advapi32
RegCreateKeyExW
RegSetValueExW
bcrypt
BCryptOpenAlgorithmProvider
BCryptCloseAlgorithmProvider
BCryptGenRandom
Exports
Exports
Sections
.text Size: 625KB - Virtual size: 625KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 142KB - Virtual size: 142KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 34KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
1391c20a26f248f7c602f20096bf1886cfe7e4d151602a1258a9bbe7c02c1c80.7z.7z
Password: infected
-
1391c20a26f248f7c602f20096bf1886cfe7e4d151602a1258a9bbe7c02c1c80.dll windows:6 windows x86 arch:x86
775ac66e9bea2bda7dd0f9493ca130de
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetFileAttributesW
GetFileAttributesExW
GetFullPathNameW
GetVolumeInformationW
GetTempPathW
GetVolumePathNamesForVolumeNameW
CloseHandle
GetLastError
DeviceIoControl
ReleaseMutex
CreateMutexW
OpenMutexW
Sleep
GetCurrentProcessId
GetTickCount
GetModuleFileNameW
LocalAlloc
LocalFree
FindVolumeClose
MoveFileW
FreeConsole
SetEndOfFile
WriteConsoleW
HeapSize
SetStdHandle
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetTimeZoneInformation
FindNextVolumeW
FindNextFileW
FindFirstVolumeW
FindFirstFileW
FindClose
CreateFileW
FormatMessageW
GetCurrentDirectoryW
HeapReAlloc
ReadConsoleW
SetFilePointerEx
GetFileSizeEx
ReadFile
GetConsoleMode
GetConsoleOutputCP
WriteFile
FlushFileBuffers
GetFileType
GetStdHandle
CreateProcessW
GetExitCodeProcess
WaitForSingleObject
FormatMessageA
WaitForSingleObjectEx
GetCurrentThreadId
GetExitCodeThread
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
TryEnterCriticalSection
DeleteCriticalSection
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
EncodePointer
DecodePointer
LCMapStringEx
GetLocaleInfoEx
CompareStringEx
GetCPInfo
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
CreateEventW
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
InitializeSListHead
GetCurrentProcess
TerminateProcess
RaiseException
RtlUnwind
InterlockedFlushSList
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
SetFileAttributesW
CreateThread
ExitThread
FreeLibraryAndExitThread
HeapAlloc
HeapFree
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
user32
SystemParametersInfoW
shell32
SHChangeNotify
advapi32
RegSetValueExW
RegCreateKeyExW
SetSecurityDescriptorDacl
SetFileSecurityW
InitializeSecurityDescriptor
AllocateAndInitializeSid
SetEntriesInAclW
Exports
Exports
AutoBuilderProcess
Sections
.text Size: 376KB - Virtual size: 376KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.7z.7z
Password: infected
-
350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe windows:6 windows x86 arch:x86
bdcfc79ca571a25df2a5d87fa136abef
Code Sign
33:00:00:04:90:0e:61:14:98:12:78:23:70:00:00:00:00:04:90Certificate
IssuerCN=Microsoft Code Signing PCA 2010,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before12-05-2022 20:47Not After11-05-2023 20:47SubjectCN=Microsoft Corporation,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:0c:52:4c:00:00:00:00:00:03Certificate
IssuerCN=Microsoft Root Certificate Authority 2010,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before06-07-2010 20:40Not After06-07-2025 20:50SubjectCN=Microsoft Code Signing PCA 2010,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
33:00:00:02:cf:a0:25:90:e3:13:04:ef:15:00:00:00:00:02:cfCertificate
IssuerCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before12-05-2022 20:46Not After11-05-2023 20:46SubjectCN=Microsoft Corporation,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:0e:90:d2:00:00:00:00:00:03Certificate
IssuerCN=Microsoft Root Certificate Authority 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before08-07-2011 20:59Not After08-07-2026 21:09SubjectCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
6b:3f:29:89:e8:83:56:da:77:cb:89:28:4e:44:4c:58:89:f4:e0:bf:d3:08:f3:bc:88:a6:96:ce:56:34:fd:13Signer
Actual PE Digest6b:3f:29:89:e8:83:56:da:77:cb:89:28:4e:44:4c:58:89:f4:e0:bf:d3:08:f3:bc:88:a6:96:ce:56:34:fd:13Digest Algorithmsha256PE Digest Matchesfalse6b:3f:29:89:e8:83:56:da:77:cb:89:28:4e:44:4c:58:89:f4:e0:bf:d3:08:f3:bc:88:a6:96:ce:56:34:fd:13Signer
Actual PE Digest6b:3f:29:89:e8:83:56:da:77:cb:89:28:4e:44:4c:58:89:f4:e0:bf:d3:08:f3:bc:88:a6:96:ce:56:34:fd:13Digest Algorithmsha256PE Digest MatchesfalseHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LCMapStringW
GetProcessHeap
HeapSize
HeapReAlloc
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
SetFilePointerEx
CreateFileW
HeapCreate
CloseHandle
WriteConsoleW
GetStringTypeW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
RaiseException
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
HeapAlloc
HeapFree
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetFileType
DecodePointer
user32
LookupIconIdFromDirectoryEx
EqualRect
IntersectRect
InflateRect
GetClipCursor
EnumPropsExW
ExcludeUpdateRgn
GetWindowRgn
WindowFromDC
GetTitleBarInfo
ToUnicode
IsCharAlphaW
CharPrevExA
CharUpperW
GetNextDlgGroupItem
IsDlgButtonChecked
CheckDlgButton
MoveWindow
AnimateWindow
DrawAnimatedRects
GetSubMenu
gdi32
Polygon
GetDCOrgEx
GetTextFaceA
DPtoLP
ExtTextOutA
GetMiterLimit
SetArcDirection
FlattenPath
ArcTo
AbortPath
GetColorAdjustment
GetDIBColorTable
GetWorldTransform
AngleArc
GdiComment
GetWinMetaFileBits
GetEnhMetaFilePaletteEntries
GetEnhMetaFileW
CopyEnhMetaFileW
PlayMetaFileRecord
SetTextJustification
SetTextCharacterExtra
SetSystemPaletteUse
SetLayout
EnumFontFamiliesExA
EnumFontFamiliesW
EqualRgn
FillRgn
FloodFill
GetROP2
GetCharWidthA
GetClipBox
GetMetaRgn
GetCurrentObject
GetCurrentPositionEx
GetGraphicsMode
GetMapMode
GetPaletteEntries
GetRasterizerCaps
GetStretchBltMode
GetTextAlign
GetTextColor
GetFontLanguageInfo
GetCharacterPlacementA
GetViewportExtEx
GetWindowExtEx
InvertRgn
MaskBlt
OffsetClipRgn
PaintRgn
PolyPolygon
PtInRegion
RectInRegion
RestoreDC
RemoveFontResourceA
RemoveFontResourceW
RoundRect
ResizePalette
SetMetaRgn
SetBkColor
SetDIBits
SetDIBitsToDevice
Sections
.text Size: 93KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 589KB - Virtual size: 588KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
51eb749d6cbd08baf9d43c2f83abd9d4d86eb5206f62ba43b768251a98ce9d3e.7z.7z
Password: infected
-
51eb749d6cbd08baf9d43c2f83abd9d4d86eb5206f62ba43b768251a98ce9d3e.dll windows:6 windows x86 arch:x86
7c8c997680af7d83baf76b63394e44e2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetTempPathW
GetLastError
CreateMutexW
OpenMutexW
CreateProcessA
GetTickCount
lstrcmpW
MultiByteToWideChar
FindFirstVolumeW
FindNextVolumeW
FindVolumeClose
GetVolumeInformationW
GetVolumePathNamesForVolumeNameW
CreateFileW
FindNextFileW
CloseHandle
GetFileSizeEx
ReadFile
WaitForSingleObject
CreateThread
MoveFileW
SetLastError
QueryPerformanceCounter
QueryPerformanceFrequency
SetEndOfFile
WriteConsoleW
SetStdHandle
FindFirstFileW
WriteFile
FindClose
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WaitForSingleObjectEx
Sleep
GetCurrentThreadId
GetNativeSystemInfo
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
TryEnterCriticalSection
DeleteCriticalSection
WideCharToMultiByte
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
EncodePointer
DecodePointer
LCMapStringEx
GetLocaleInfoEx
GetStringTypeW
CompareStringEx
GetCPInfo
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
CreateEventW
InitializeSListHead
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetCurrentProcessId
GetCurrentProcess
TerminateProcess
RaiseException
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
VirtualQuery
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
GetModuleFileNameW
HeapAlloc
HeapFree
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStdHandle
GetFileType
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
SetFilePointerEx
ReadConsoleW
HeapReAlloc
HeapSize
GetTimeZoneInformation
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
shell32
SHChangeNotify
advapi32
RegCreateKeyExW
RegSetValueExW
bcrypt
BCryptOpenAlgorithmProvider
BCryptCloseAlgorithmProvider
BCryptGenRandom
Exports
Exports
VisibleEntry
Sections
.text Size: 626KB - Virtual size: 625KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 142KB - Virtual size: 142KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 34KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Samples/17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.7z.7z
Password: infected
-
17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe windows:6 windows x86 arch:x86
b2c5ad02aef7ea7817eecfa3475edcd2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindVolumeClose
GetFileAttributesW
GetFileAttributesExW
GetFullPathNameW
GetVolumeInformationW
GetTempPathW
GetVolumePathNamesForVolumeNameW
CloseHandle
GetLastError
HeapAlloc
HeapFree
GetProcessHeap
DeviceIoControl
Sleep
FindNextVolumeW
GetTickCount
GetModuleFileNameW
LocalFree
FormatMessageW
MoveFileW
WriteConsoleW
HeapSize
SetStdHandle
SetEnvironmentVariableW
FindNextFileW
FindFirstVolumeW
FindFirstFileW
FindClose
CreateFileW
TerminateProcess
GetCurrentDirectoryW
FormatMessageA
WaitForSingleObjectEx
GetCurrentThreadId
GetExitCodeThread
GetNativeSystemInfo
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
TryEnterCriticalSection
DeleteCriticalSection
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
EncodePointer
DecodePointer
LCMapStringEx
GetLocaleInfoEx
CompareStringEx
GetCPInfo
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
CreateEventW
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetCurrentProcess
GetCurrentProcessId
InitializeSListHead
RaiseException
RtlUnwind
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
ExitProcess
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
ReadFile
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
HeapReAlloc
GetTimeZoneInformation
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEndOfFile
user32
SystemParametersInfoW
shell32
SHGetSpecialFolderPathW
Sections
.text Size: 386KB - Virtual size: 385KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 219KB - Virtual size: 218KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Samples/5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.7z.7z
Password: infected
-
5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe windows:6 windows x86 arch:x86
ede5e0724f09124ab3994aacb2b361db
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesExW
GetFullPathNameW
GetVolumeInformationW
GetTempPathW
GetVolumePathNamesForVolumeNameW
OutputDebugStringW
CloseHandle
GetLastError
HeapAlloc
HeapFree
GetProcessHeap
DeviceIoControl
SetEvent
WaitForSingleObject
CreateEventW
Sleep
GetFileAttributesW
CreateThread
GetModuleFileNameW
LocalAlloc
LocalFree
FormatMessageW
MoveFileW
FreeConsole
SetFilePointerEx
GetFileSizeEx
ReadFile
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
GetFileType
CreateProcessW
FindVolumeClose
FindNextVolumeW
FindNextFileW
FindFirstVolumeW
FindFirstFileW
FindClose
CreateFileW
GetCurrentDirectoryW
ReadConsoleW
HeapReAlloc
GetTimeZoneInformation
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
HeapSize
WriteConsoleW
GetCurrentProcessId
FormatMessageA
WaitForSingleObjectEx
GetCurrentThreadId
GetExitCodeThread
GetNativeSystemInfo
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
TryEnterCriticalSection
DeleteCriticalSection
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
QueryPerformanceCounter
SetEndOfFile
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
EncodePointer
DecodePointer
LCMapStringEx
GetLocaleInfoEx
CompareStringEx
GetCPInfo
InitializeCriticalSectionAndSpinCount
ResetEvent
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetCurrentProcess
TerminateProcess
InitializeSListHead
RaiseException
RtlUnwind
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
SetFileAttributesW
ExitThread
FreeLibraryAndExitThread
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetExitCodeProcess
user32
GetSystemMetrics
SystemParametersInfoW
shell32
ShellExecuteA
SHChangeNotify
advapi32
SetEntriesInAclW
StartServiceCtrlDispatcherW
SetServiceStatus
RegisterServiceCtrlHandlerW
QueryServiceStatusEx
OpenServiceW
OpenSCManagerW
GetServiceDisplayNameW
DeleteService
CreateServiceW
ControlService
CloseServiceHandle
ChangeServiceConfigA
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
SetSecurityDescriptorDacl
SetFileSecurityW
InitializeSecurityDescriptor
AllocateAndInitializeSid
Sections
.text Size: 401KB - Virtual size: 401KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Samples/7883f01096db9bcf090c2317749b6873036c27ba92451b212b8645770e1f0b8a.7z.7z
Password: infected
-
7883f01096db9bcf090c2317749b6873036c27ba92451b212b8645770e1f0b8a.exe windows:6 windows x86 arch:x86
b3794746554a5701b2de3e5ea435c59b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesExW
GetFullPathNameW
GetVolumeInformationW
GetTempPathW
GetVolumePathNamesForVolumeNameW
CloseHandle
GetLastError
HeapAlloc
HeapFree
GetProcessHeap
DeviceIoControl
Sleep
GetCurrentProcessId
TerminateProcess
GetFileAttributesW
GetTickCount
GetModuleFileNameW
LocalFree
FormatMessageW
MoveFileW
FreeConsole
WriteConsoleW
HeapSize
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
FindVolumeClose
FindNextVolumeW
FindNextFileW
FindFirstVolumeW
FindFirstFileW
FindClose
CreateFileW
GetCurrentDirectoryW
FormatMessageA
WaitForSingleObjectEx
GetCurrentThreadId
GetExitCodeThread
GetNativeSystemInfo
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
TryEnterCriticalSection
DeleteCriticalSection
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
EncodePointer
DecodePointer
LCMapStringEx
GetLocaleInfoEx
CompareStringEx
GetCPInfo
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
CreateEventW
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetCurrentProcess
InitializeSListHead
RaiseException
RtlUnwind
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
ExitProcess
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
WaitForSingleObject
GetExitCodeProcess
CreateProcessW
GetFileType
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
ReadFile
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
HeapReAlloc
GetTimeZoneInformation
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
SetEndOfFile
user32
SystemParametersInfoW
shell32
SHChangeNotify
advapi32
RegSetValueExW
RegCreateKeyExW
Sections
.text Size: 386KB - Virtual size: 385KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
ae7c868713e1d02b4db60128c651eb1e3f6a33c02544cc4cb57c3aa6c6581b6e.7z.7z
Password: infected
-
ae7c868713e1d02b4db60128c651eb1e3f6a33c02544cc4cb57c3aa6c6581b6e.exe windows:6 windows x86 arch:x86
b3794746554a5701b2de3e5ea435c59b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesExW
GetFullPathNameW
GetVolumeInformationW
GetTempPathW
GetVolumePathNamesForVolumeNameW
CloseHandle
GetLastError
HeapAlloc
HeapFree
GetProcessHeap
DeviceIoControl
Sleep
GetCurrentProcessId
TerminateProcess
GetFileAttributesW
GetTickCount
GetModuleFileNameW
LocalFree
FormatMessageW
MoveFileW
FreeConsole
WriteConsoleW
HeapSize
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
FindVolumeClose
FindNextVolumeW
FindNextFileW
FindFirstVolumeW
FindFirstFileW
FindClose
CreateFileW
GetCurrentDirectoryW
FormatMessageA
WaitForSingleObjectEx
GetCurrentThreadId
GetExitCodeThread
GetNativeSystemInfo
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
TryEnterCriticalSection
DeleteCriticalSection
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
EncodePointer
DecodePointer
LCMapStringEx
GetLocaleInfoEx
CompareStringEx
GetCPInfo
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
CreateEventW
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetCurrentProcess
InitializeSListHead
RaiseException
RtlUnwind
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
ExitProcess
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
WaitForSingleObject
GetExitCodeProcess
CreateProcessW
GetFileType
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
ReadFile
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
HeapReAlloc
GetTimeZoneInformation
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
SetEndOfFile
user32
SystemParametersInfoW
shell32
SHChangeNotify
advapi32
RegSetValueExW
RegCreateKeyExW
Sections
.text Size: 386KB - Virtual size: 385KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
c4c8be0c939e4c24e11bad90549e3951b7969e78056d819425ca53e87af8d8ed.7z.7z
-
e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.7z.7z