Static task
static1
Behavioral task
behavioral1
Sample
f30b9f6e913798ca52154c88725ee262a7bf92fe7caac1ae2e5147e457b9b08a.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f30b9f6e913798ca52154c88725ee262a7bf92fe7caac1ae2e5147e457b9b08a.dll
Resource
win10v2004-20240419-en
General
-
Target
f30b9f6e913798ca52154c88725ee262a7bf92fe7caac1ae2e5147e457b9b08a.zip
-
Size
54KB
-
MD5
628eb8a7925da19193128f888cb9283f
-
SHA1
d6cb6de455a9d0cfa3d6109ff40df241de6d66bd
-
SHA256
d06c0c448281cb63599479640d1a270c79e79a04b05d8703ea4190ad439f4ae3
-
SHA512
22cfe3d0efddeb26b7a9f6d77917fb6f8bd3ec9444eda6ccb8b37a9471c1511261438ff97cddce6f60cb4a71d708ea784713327d83d0522c4c35df2b17b61412
-
SSDEEP
1536:NMY4pC9PSEj5zHDAdLo3P00ls2yaI7AOuNVgzPt00nv:Nb4c935zsqjllyaeioh/nv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/f30b9f6e913798ca52154c88725ee262a7bf92fe7caac1ae2e5147e457b9b08a.exe
Files
-
f30b9f6e913798ca52154c88725ee262a7bf92fe7caac1ae2e5147e457b9b08a.zip.zip
Password: infected
-
f30b9f6e913798ca52154c88725ee262a7bf92fe7caac1ae2e5147e457b9b08a.exe.dll windows:5 windows x64 arch:x64
Password: infected
9953472df0cd811a6d9a53885ecaaf21
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
kernel32
HeapReAlloc
HeapFree
HeapSize
HeapValidate
GetProcessHeap
VirtualFree
VirtualProtect
MultiByteToWideChar
WideCharToMultiByte
CreateThread
TerminateThread
GetExitCodeThread
SuspendThread
ResumeThread
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
ExitProcess
GetNativeSystemInfo
GetModuleFileNameW
GetModuleHandleExW
CreateMutexW
OpenMutexW
CreateWaitableTimerW
CreateEventW
SetProcessShutdownParameters
GetProcessShutdownParameters
LocalFree
GetProcessTimes
OpenProcess
GetCurrentProcess
TerminateProcess
GetExitCodeProcess
GetProcessId
DuplicateHandle
SetHandleInformation
CompareFileTime
CreatePipe
PeekNamedPipe
lstrcmpiW
CreateProcessW
ExpandEnvironmentStringsW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
ResetEvent
GetSystemTimeAsFileTime
GetVersionExW
GetLocaleInfoW
GetModuleHandleW
lstrcmpW
HeapAlloc
WaitForMultipleObjects
WaitForSingleObject
MoveFileExW
SetEvent
FindFirstFileW
GetFileAttributesW
SetFileAttributesW
GetTempFileNameW
GetTempPathW
FindClose
SetFilePointerEx
ReadFile
GetFileSizeEx
Sleep
GetShortPathNameW
WaitForMultipleObjectsEx
WaitForSingleObjectEx
SleepEx
GetLastError
DeleteFileW
CreateFileW
CloseHandle
SetWaitableTimer
WriteFile
user32
SetWindowLongPtrW
TranslateMessage
DefWindowProcW
UnregisterClassW
RegisterClassExW
CreateWindowExW
OemToCharA
GetMessageW
IsCharAlphaNumericA
wsprintfW
DispatchMessageW
GetSystemMetrics
DestroyWindow
GetWindowLongPtrW
GetLastInputInfo
advapi32
CryptDecrypt
CryptImportKey
CryptGenRandom
CryptDestroyKey
CryptGenKey
CryptReleaseContext
CryptAcquireContextW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
AllocateAndInitializeSid
FreeSid
CheckTokenMembership
GetCurrentHwProfileW
OpenProcessToken
GetTokenInformation
GetUserNameW
RegCreateKeyExW
RegSetValueExW
CryptEncrypt
shell32
CommandLineToArgvW
SHCreateDirectoryExW
ole32
CoUninitialize
CoInitializeEx
CoCreateInstance
oleaut32
VariantClear
SafeArrayAccessData
SafeArrayCreate
SysAllocString
SysFreeString
SafeArrayUnaccessData
VariantInit
shlwapi
StrStrNIW
PathRemoveFileSpecW
StrToIntW
SHDeleteKeyW
netapi32
NetWkstaGetInfo
NetUserGetInfo
NetApiBufferFree
crypt32
CryptImportPublicKeyInfo
CryptStringToBinaryW
CryptDecodeObjectEx
ws2_32
htonl
Sections
.text Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 164B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ