Static task
static1
Behavioral task
behavioral1
Sample
6f8c628057278a248d5cc3035024e06bff45b8f5.exe
Resource
win10v2004-20240508-en
General
-
Target
CeWorker.zip
-
Size
346KB
-
MD5
e879d3852a6c9f99d33ebfbf391d1140
-
SHA1
c1204f047b789a20b1b7caaa75936cb170ac8a7d
-
SHA256
27a2984d3864cdeab3798b419874545f4fa0f052a0c39cc7ce9ab58558528bad
-
SHA512
7a96d0bf6d8f898c76b7bdf7ef0bbfc95ce310520808382a50e6eaeef23486d50198d11b990955dc2451fdeb392d843dccf7d15acaef4d99df597943156ca552
-
SSDEEP
6144:UJivNdoLVOUzN2fGg3duMuDdhyFas1junryt06KOx6TMBRYXgnNRhAoS8uG3zFZ:ki1GcltuDKwnWWy3BSXgNLAofHzFZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/6f8c628057278a248d5cc3035024e06bff45b8f5
Files
-
CeWorker.zip.zip
Password: infected
-
6f8c628057278a248d5cc3035024e06bff45b8f5.exe windows:6 windows x86 arch:x86
1067457a340c30de86181617fca10806
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteCriticalSection
LCMapStringEx
InitializeCriticalSectionEx
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
RaiseException
DecodePointer
CreateMutexW
GetLastError
lstrlenA
lstrcmpiA
OutputDebugStringA
CopyFileW
SystemTimeToFileTime
GetLocalTime
DeleteFileW
GetCommandLineW
TerminateThread
CreateThread
TerminateProcess
Sleep
WaitForSingleObject
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetCurrentProcess
FileTimeToLocalFileTime
GetProcessTimes
CreateProcessW
OpenProcess
lstrcpyW
FileTimeToSystemTime
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
CloseHandle
K32GetModuleFileNameExW
CreateDirectoryW
GetSystemDirectoryW
GetModuleFileNameW
lstrcatW
QueryFullProcessImageNameW
LoadLibraryA
LocalFree
MultiByteToWideChar
WideCharToMultiByte
SetLastError
CreateFileW
GetFileAttributesW
GetFileSizeEx
ReadFile
SetFileAttributesW
SetFilePointerEx
WriteFile
CreateDirectoryExW
MoveFileExW
GetFileSize
lstrcmpW
GetPrivateProfileStringW
WritePrivateProfileStringW
GetWindowsDirectoryA
GetNativeSystemInfo
GetComputerNameW
GetStdHandle
GlobalAlloc
GlobalSize
GlobalUnlock
GlobalLock
GlobalFree
RtlUnwind
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetFileType
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
SetStdHandle
GetStringTypeW
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
WriteConsoleW
lstrlenW
lstrcmpiW
LoadLibraryW
GetProcAddress
GetTickCount64
FindNextFileW
FindFirstFileW
FindClose
user32
GetClipboardData
SetClipboardData
IsWindow
IsIconic
SetFocus
LoadIconW
LoadCursorW
UpdateWindow
DestroyWindow
CreateWindowExW
RegisterClassExW
DefWindowProcW
DispatchMessageW
CloseClipboard
OpenClipboard
ClientToScreen
IsWindowVisible
GetClassNameW
EnumWindows
EnumChildWindows
wsprintfW
PostMessageW
ShowWindow
SetWindowPos
GetSystemMetrics
GetWindowTextW
SetForegroundWindow
SetLayeredWindowAttributes
GetWindowLongW
SetWindowLongW
GetDesktopWindow
OpenDesktopW
SwitchDesktop
CloseDesktop
GetClassLongW
SetCapture
SendInput
mouse_event
keybd_event
GetKeyState
EmptyClipboard
PostQuitMessage
EnumClipboardFormats
TranslateMessage
GetMessageW
LoadStringW
FindWindowW
advapi32
OpenProcessToken
DuplicateTokenEx
GetTokenInformation
ImpersonateLoggedOnUser
CreateProcessWithTokenW
ConvertSidToStringSidA
RegGetValueW
RevertToSelf
SetNamedSecurityInfoW
LookupAccountSidW
LookupAccountNameW
ole32
CoCreateInstance
CoUninitialize
CoInitializeEx
CoSetProxyBlanket
CoCreateGuid
oleaut32
VariantClear
VariantInit
SysAllocString
SysFreeString
shlwapi
PathAppendA
PathIsDirectoryW
PathFindExtensionW
StrStrIA
StrCmpNIW
StrCmpNW
PathFindFileNameW
PathAppendW
PathFileExistsA
StrStrW
PathFileExistsW
StrStrIW
shell32
SHOpenFolderAndSelectItems
ord155
ShellExecuteW
SHGetSpecialFolderPathW
SHCreateDirectoryExW
ord190
iphlpapi
GetIpAddrTable
GetAdaptersAddresses
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
winhttp
WinHttpOpen
WinHttpCloseHandle
WinHttpConnect
WinHttpReadData
WinHttpWriteData
WinHttpQueryDataAvailable
WinHttpQueryOption
WinHttpSetOption
WinHttpOpenRequest
WinHttpSetStatusCallback
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpQueryHeaders
WinHttpCrackUrl
WinHttpAddRequestHeaders
ws2_32
inet_ntop
Sections
.text Size: 518KB - Virtual size: 518KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 126KB - Virtual size: 125KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 142KB - Virtual size: 141KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ