Behavioral task
behavioral1
Sample
381333799197cdf21b4d12d9ce83587673c52b336547a5425bbd9c69bba00d5f.exe
Resource
win7-20240221-en
General
-
Target
262448352a09eb1da2f969f825c849cce7ec7dbcb79deda59611ca94fa7f099b
-
Size
134KB
-
MD5
56735bfaafb1597fa6a904a11e373d2c
-
SHA1
11ed0afcbd705607a663ac6b299939c3a9864c76
-
SHA256
262448352a09eb1da2f969f825c849cce7ec7dbcb79deda59611ca94fa7f099b
-
SHA512
0058d7eea12be04056ed79ec61234833cdc011be75fdfaf37dcf72d9bb7c7695488896d2e7cbf8f88056b228c6f1141eca4db047dfffe72903107e5d30363014
-
SSDEEP
3072:xPfUETU+8N8acM2Ol/tniEjS97Mn8/4toQRSdqoNMu8dEUPhzMvYv:xnU3/BtiEu97Q8UoQoY5rdpZgQv
Malware Config
Extracted
cryptbot
unic16m.top
unic16e.top
Signatures
-
Cryptbot family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/381333799197cdf21b4d12d9ce83587673c52b336547a5425bbd9c69bba00d5f.exe
Files
-
262448352a09eb1da2f969f825c849cce7ec7dbcb79deda59611ca94fa7f099b.zip
Password: infected
-
381333799197cdf21b4d12d9ce83587673c52b336547a5425bbd9c69bba00d5f.exe.exe windows:6 windows x86 arch:x86
5e83a2a4f8bd496b2fc660065aba6076
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameW
GlobalMemoryStatusEx
GetFileSizeEx
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
ReadFile
WriteFile
SetFilePointer
GetFileInformationByHandle
FileTimeToSystemTime
GetLocalTime
LocalFree
SystemTimeToFileTime
WideCharToMultiByte
GetTickCount
GetPrivateProfileStringW
ExitProcess
SetEndOfFile
WriteConsoleW
HeapReAlloc
HeapSize
FlushFileBuffers
GetStringTypeW
GetUserDefaultLocaleName
GetSystemInfo
CloseHandle
FindClose
Sleep
GetFileAttributesW
CreateFileW
LocalAlloc
GetLocaleInfoW
GetFileSize
GetModuleFileNameW
RemoveDirectoryW
FindNextFileW
FindFirstFileW
CreateDirectoryW
CopyFileW
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetTimeZoneInformation
LCMapStringW
DecodePointer
CompareStringW
GetTimeFormatW
GetDateFormatW
ReadConsoleW
SetStdHandle
ExpandEnvironmentStringsW
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetCurrentProcess
TerminateProcess
RtlUnwind
RaiseException
GetLastError
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetModuleHandleExW
GetStdHandle
HeapFree
HeapAlloc
GetFileType
GetConsoleOutputCP
GetConsoleMode
SetFilePointerEx
user32
GetKeyboardLayoutList
GetWindowRect
GetSystemMetrics
GetDesktopWindow
GetWindowDC
gdi32
GetDeviceCaps
BitBlt
SaveDC
SelectObject
CreateDIBSection
CreateCompatibleDC
DeleteDC
RestoreDC
DeleteObject
advapi32
GetUserNameW
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegQueryValueExW
shell32
ShellExecuteW
SHFileOperationW
gdiplus
GdipGetImageEncodersSize
GdipSaveImageToFile
GdipDisposeImage
GdipCreateBitmapFromHBITMAP
GdipCloneImage
GdipGetImageEncoders
GdiplusShutdown
GdiplusStartup
GdipFree
GdipAlloc
wininet
HttpEndRequestW
InternetOpenW
HttpSendRequestExW
HttpAddRequestHeadersA
InternetConnectW
HttpOpenRequestW
InternetWriteFile
crypt32
CryptUnprotectData
Sections
.text Size: 208KB - Virtual size: 207KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ