Static task
static1
Behavioral task
behavioral1
Sample
4ccac177707d9f4664fb6dfb3a0038640298c10526b47b8d2bcc49db5d139552.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
4ccac177707d9f4664fb6dfb3a0038640298c10526b47b8d2bcc49db5d139552.exe
Resource
win10v2004-20240508-en
General
-
Target
17753630752.zip
-
Size
965KB
-
MD5
c522178e97c52709088fa6fb49785ba7
-
SHA1
ebd47c2b0ff1e660a8fa2f8c8b25a043e212e9fd
-
SHA256
9b43ae1bfcd70f3353ce7542f1c7172af39fc922d24b152ed9eec60fa5ac53ca
-
SHA512
a3f5ed11f9b10c747df1817178522b923ff4b3e587a48a5eb6c3736258c1d2915a0ff7d642a8e08b546bb124d7fae1322c596a25ef634acc9b87a3653e8366fc
-
SSDEEP
24576:jN1uLICPgLnpYpeEadELdq+PQWNyC6v9/z:h1ukicnpYRhq9We/z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/4ccac177707d9f4664fb6dfb3a0038640298c10526b47b8d2bcc49db5d139552
Files
-
17753630752.zip.zip
Password: infected
-
4ccac177707d9f4664fb6dfb3a0038640298c10526b47b8d2bcc49db5d139552.exe windows:6 windows x64 arch:x64
Password: infected
46540b357e9852a953c653a14a3d3725
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
CloseHandle
SetLastError
CreateFileW
LocalFree
GetLastError
advapi32
GetTokenInformation
RegQueryValueExW
RegOpenKeyExW
Sections
.text Size: 142KB - Virtual size: 142KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ