Static task
static1
Behavioral task
behavioral1
Sample
zblg.exe
Resource
win10v2004-20240419-en
General
-
Target
zblg.exe
-
Size
360KB
-
MD5
54536df4fbc3fabdf26f44e09044c234
-
SHA1
37e9ed1c6a4a2f26515d1572fb1d1be2bcf90a6c
-
SHA256
cefa57d05b4f416c9c0626c7cece5660d5310446848f1a226bf275b93b3841a2
-
SHA512
e0f83d9ad616f9040835dc4d370197ad3b32430946a124cbc4b620171e169123ac03df0644d0dc670da0b7a2c6c390f2422b8f63deb7a69f72ed6ef11150410e
-
SSDEEP
6144:cw0wssgpy9O55XZkpNcPPGsyZOcfxYQ5XqjOCf/JIqV06lK2lM10bQzKIop6Elj:x0iOgkZk8nduOIvajznf0TcncE6Kj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource zblg.exe
Files
-
zblg.exe.exe windows:4 windows x64 arch:x64
bc805d65e2beee4dadcebfd9a12730e9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
SetCurrentDirectoryW
GetFileAttributesW
CreateFileW
lstrlenA
lstrcmpiA
lstrcpyW
CloseHandle
GetShortPathNameW
GetFileSize
GlobalAlloc
ReadFile
SetFilePointer
WriteFile
GlobalFree
lstrcpyA
GetModuleHandleW
LoadLibraryW
GetProcAddress
FreeLibrary
GetEnvironmentVariableW
GetLastError
GetDiskFreeSpaceW
WritePrivateProfileStringW
GetPrivateProfileStringW
GetCurrentProcess
GetTempPathW
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
CreateDirectoryW
FindFirstFileW
FindClose
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
CompareFileTime
SetFileAttributesW
DeleteFileW
FindNextFileW
RemoveDirectoryW
GetModuleFileNameW
GetCurrentDirectoryW
SetFileTime
CreateFileA
GetFileTime
GetSystemDirectoryW
LoadLibraryExW
lstrlenW
GetStartupInfoA
GetModuleHandleA
RtlUnwindEx
HeapCreate
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
HeapValidate
QueryPerformanceFrequency
QueryPerformanceCounter
GetStartupInfoW
GetStdHandle
GetFileType
DuplicateHandle
GetCommandLineA
GetModuleFileNameA
GetEnvironmentStrings
FreeEnvironmentStringsA
IsDebuggerPresent
OutputDebugStringA
UnhandledExceptionFilter
VirtualAlloc
VirtualQuery
ExitProcess
SetConsoleCtrlHandler
GetConsoleOutputCP
WriteConsoleW
WideCharToMultiByte
IsDBCSLeadByteEx
MultiByteToWideChar
SetStdHandle
GetConsoleMode
SetFilePointerEx
DeleteFileA
RaiseException
LoadLibraryA
user32
SendMessageW
SetFocus
EnableWindow
GetWindowTextW
SetWindowTextW
MessageBoxW
ShowWindow
CharNextA
wsprintfA
ExitWindowsEx
CharPrevW
PostMessageW
LoadStringW
comctl32
ord17
ole32
CoTaskMemFree
CoInitialize
CoUninitialize
shell32
SHChangeNotify
SHBrowseForFolderW
SHGetPathFromIDListW
Sections
.text Size: 87KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PBU30 Size: 512B - Virtual size: 112B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.pdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ