Static task
static1
Behavioral task
behavioral1
Sample
a67df0a8b32bdc5f9d224db118b3153f66518737e702314873b673c914b2bb5c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a67df0a8b32bdc5f9d224db118b3153f66518737e702314873b673c914b2bb5c.exe
Resource
win10v2004-20240426-en
General
-
Target
a67df0a8b32bdc5f9d224db118b3153f66518737e702314873b673c914b2bb5c.zip
-
Size
575KB
-
MD5
f7f1b1a26fee41fb63a657cbdefadf55
-
SHA1
a0e8af691d323f1d0fae6a8c5a936e6afe6c4544
-
SHA256
774bc51c7a1c63d3452ad7183db50034131d1c8deb0244ef7356bd7300a34ca6
-
SHA512
3c36f397b2b7f40ef570c77c54805f17ba0e6fde6e0fb99f9aaa5246d6adf89a53824850af927eae0c8c9c76e3e24dba688963fa0075817640ae3f380fa9046c
-
SSDEEP
12288:Lbf6tHFErVtcy3thqHTwmWNiRRWp/hYBmHPY9ZDRQlcAmjw8xRvbeBiC7G:nf6dWrRth8GNcRqhYBmvY9ZDcXmjwSpN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/a67df0a8b32bdc5f9d224db118b3153f66518737e702314873b673c914b2bb5c
Files
-
a67df0a8b32bdc5f9d224db118b3153f66518737e702314873b673c914b2bb5c.zip.zip
Password: infected
-
a67df0a8b32bdc5f9d224db118b3153f66518737e702314873b673c914b2bb5c.exe windows:6 windows x64 arch:x64
Password: infected
2cc23f4b940604684a3cf387a91ad984
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetModuleHandleExW
GetSystemDefaultUILanguage
GetShortPathNameW
GetUserDefaultLangID
GetModuleFileNameW
GetConsoleCP
GetThreadLocale
GetUserDefaultUILanguage
GetEnvironmentVariableW
FlushProcessWriteBuffers
CreateMutexW
GetLargePageMinimum
WaitForSingleObject
UnregisterApplicationRecoveryCallback
GetSystemDirectoryW
IsSystemResumeAutomatic
GetSystemDefaultLangID
GetACP
OpenProcess
GetVersion
GetCommandLineA
GetTickCount64
GetLastError
GetMaximumProcessorGroupCount
GetThreadUILanguage
CreateFileA
GetActiveProcessorGroupCount
lstrcatW
CreateThreadpoolCleanupGroup
CreateThread
SwitchToThread
IsThreadAFiber
GetCurrentProcessorNumber
GetProcAddress
UnregisterApplicationRestart
VirtualAllocEx
WTSGetActiveConsoleSessionId
GetCurrentProcessId
CreateProcessW
GetConsoleOutputCP
lstrlenA
ConvertFiberToThread
GetComputerNameExA
SetFileApisToANSI
GetTickCount
GetConsoleAliasExesLengthA
IsDebuggerPresent
WriteFile
lstrcatA
ReadFile
FindFirstFileA
GetVersionExA
GetSystemInfo
VerSetConditionMask
GetModuleHandleW
VerifyVersionInfoW
HeapFree
ProcessIdToSessionId
HeapAlloc
GetProcessHeap
Process32First
Process32Next
LocalFree
CreateFileW
WriteConsoleW
SetFilePointerEx
HeapReAlloc
HeapSize
GetConsoleMode
FlushFileBuffers
GetStringTypeW
SetStdHandle
GetCurrentProcess
GetSystemDefaultLCID
EraseTape
WriteProcessMemory
GetLogicalDrives
GetConsoleAliasExesLengthW
AreFileApisANSI
lstrcpyA
GetConsoleWindow
GlobalAlloc
lstrcpyW
ExitProcess
CloseHandle
Process32FirstW
LoadLibraryA
Process32NextW
Sleep
CreateToolhelp32Snapshot
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetFileType
LCMapStringW
GetStdHandle
WideCharToMultiByte
MultiByteToWideChar
LoadLibraryExW
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
SetLastError
RtlUnwindEx
RaiseException
EncodePointer
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlPcToFileHeader
user32
wsprintfA
CloseClipboard
CharUpperA
advapi32
CreateProcessAsUserW
RevertToSelf
ImpersonateLoggedOnUser
DuplicateTokenEx
GetTokenInformation
AdjustTokenPrivileges
RegDisablePredefinedCacheEx
LookupPrivilegeValueA
OpenProcessToken
GetUserNameW
shell32
SHGetSpecialFolderPathA
ShellExecuteW
ole32
CoInitializeEx
CoCreateGuid
CoInitializeSecurity
CoCreateInstance
CoUninitialize
CoInitialize
oleaut32
VariantClear
SysAllocString
SysFreeString
VariantInit
wininet
InternetOpenA
HttpOpenRequestA
InternetReadFile
InternetCloseHandle
HttpSendRequestA
InternetConnectA
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
shlwapi
StrChrA
StrStrA
ws2_32
gethostbyname
send
recv
WSACleanup
htons
connect
socket
WSAStartup
closesocket
netapi32
NetApiBufferFree
NetWkstaGetInfo
Sections
.text Size: 812KB - Virtual size: 811KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 236B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ