Static task
static1
Behavioral task
behavioral1
Sample
bb8bbcc948e8dca2e5a0270c41c062a29994a2d9b51e820ed74d9b6e2a01ddcf.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bb8bbcc948e8dca2e5a0270c41c062a29994a2d9b51e820ed74d9b6e2a01ddcf.exe
Resource
win10v2004-20240508-en
General
-
Target
17183806844.zip
-
Size
271KB
-
MD5
5da693e8ab871c5e1755df3e14ee61b9
-
SHA1
9be4ce2e45eb1581e14135a854a16a84998b1cc6
-
SHA256
7f998ba3840a745101f1153dee4d5ef60c679a59e17b7016d6c884f5cb23d5cd
-
SHA512
a84d57ff7c72fbb77aed9ea3c9bdf27386c6be2fc4f6ffff1ab22ae02eb3ecc31a4aba8f0de91918a0c7f127698560c8b7cb81ad94bb2dcae54d64ab6c6be030
-
SSDEEP
6144:tu/naMzltoqyt7pA3VAfs5pMM/UQQrnnJv5O1BgU9z3JfJtazOHtZ8t:tu/aMzEN7CnMM/BQrnnJvoBgYfzdGt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/bb8bbcc948e8dca2e5a0270c41c062a29994a2d9b51e820ed74d9b6e2a01ddcf
Files
-
17183806844.zip.zip
Password: infected
-
bb8bbcc948e8dca2e5a0270c41c062a29994a2d9b51e820ed74d9b6e2a01ddcf.exe windows:4 windows x86 arch:x86
Password: infected
03f91bdad97904026326fc3ace33b897
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapCreate
GetModuleHandleA
CreateEventA
WaitForSingleObject
CloseHandle
HeapDestroy
GetModuleFileNameW
lstrlenW
HeapFree
HeapAlloc
MulDiv
GetProcessHeap
GetStartupInfoA
user32
GetDlgCtrlID
GetScrollRange
DestroyIcon
KillTimer
DrawIcon
GetClientRect
GetScrollPos
LoadStringW
FillRect
PostMessageW
CreateIcon
ShowWindow
GetCursor
DeleteMenu
EndMenu
DrawFocusRect
BeginPaint
GetDCEx
DefMDIChildProcW
CharUpperBuffW
CreateMenu
GetScrollInfo
GetMenuItemInfoW
MsgWaitForMultipleObjectsEx
ReleaseDC
GetClassInfoExW
GetWindowTextW
DestroyWindow
EndPaint
EnableWindow
CreateWindowExW
LoadBitmapW
CreateAcceleratorTableW
DrawMenuBar
PeekMessageW
GetSystemMenu
RegisterClassW
IsDialogMessageW
IsZoomed
CopyImage
GetMenuStringW
IsIconic
ShowCaret
InsertMenuW
SetTimer
LoadCursorW
DefFrameProcW
LoadIconW
GetClassInfoW
DestroyMenu
FrameRect
DispatchMessageW
SetMenuItemInfoW
SetScrollPos
DestroyCursor
gdi32
Pie
RectVisible
StretchBlt
GetTextMetricsW
Polygon
CreateCompatibleBitmap
GetEnhMetaFileHeader
CreatePalette
GetStockObject
CreateICW
MoveToEx
GetWindowOrgEx
CreateSolidBrush
SetAbortProc
SetTextColor
SetBkMode
RestoreDC
PolyBezierTo
RoundRect
AngleArc
CreateDCW
SetRectRgn
ole32
CoTaskMemAlloc
CoCreateInstance
CoUninitialize
CoTaskMemFree
IsEqualGUID
CoInitialize
OleUninitialize
OleInitialize
oleaut32
SafeArrayGetElement
SafeArrayAccessData
VariantCopyInd
SysAllocStringLen
SysReAllocStringLen
GetErrorInfo
SafeArrayPtrOfIndex
SafeArrayCreate
SysFreeString
VariantCopy
VariantInit
SafeArrayGetUBound
SafeArrayUnaccessData
VariantClear
VariantChangeType
SafeArrayPutElement
SafeArrayGetLBound
msvcrt
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
memcpy
qsort
wcsrchr
memset
wcschr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
__setusermatherr
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
Sections
.text Size: 149KB - Virtual size: 149KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 324KB - Virtual size: 324KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 68B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ