Static task
static1
Behavioral task
behavioral1
Sample
f18a6d3cf01c2f0d46fb23df3ed1e49c7e185b2796f8d54e184a6ea168da0bbd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
f18a6d3cf01c2f0d46fb23df3ed1e49c7e185b2796f8d54e184a6ea168da0bbd.exe
Resource
win11-20240508-en
General
-
Target
17809664995.zip
-
Size
284KB
-
MD5
b3f45f545ad3151f4d00a4f214c4deef
-
SHA1
68881b1dcb3cff3922f6a0d21f7b3b4b1b52bd4f
-
SHA256
bf2b8bb723e5d77c4617baff19aa4a608f5f07215110ce039446f79418387759
-
SHA512
27eb8d8fd4639e3f7fbfa45d86dc567483dfddc457c481b9d47b97beb05b390244a8252e10e1f32d7ffc439184026866aa0f5e932ac82e4c7511b4defd831882
-
SSDEEP
6144:aQA33fZ/aAFWX822ezoJBSgAtVqVhKc6DkC8AVgeLTgfIc0LRs5E:Q8iWoSYgv42k7jfIB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/f18a6d3cf01c2f0d46fb23df3ed1e49c7e185b2796f8d54e184a6ea168da0bbd
Files
-
17809664995.zip.zip
Password: infected
-
f18a6d3cf01c2f0d46fb23df3ed1e49c7e185b2796f8d54e184a6ea168da0bbd.exe windows:5 windows x64 arch:x64
Password: infected
48e28d1a984d6b5a99349353710a92d3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
WriteFile
SetEndOfFile
CreateToolhelp32Snapshot
VirtualAllocEx
GetProcAddress
GetModuleHandleW
GetCurrentProcess
CreateRemoteThread
LoadLibraryA
VirtualFreeEx
WaitForSingleObject
SetLastError
CloseHandle
ReadProcessMemory
OpenProcess
GetLastError
Process32FirstW
Process32NextW
FlushFileBuffers
GetModuleFileNameA
DeleteFileA
GetTempPathA
GetTempFileNameA
CreateFileA
SetFileAttributesA
GetModuleFileNameW
SetFileAttributesW
ReadFile
SetFilePointer
GetModuleHandleA
CreateFileW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
DecodePointer
FlsGetValue
FlsSetValue
FlsFree
GetCurrentThreadId
FlsAlloc
Sleep
ExitProcess
GetStdHandle
RtlUnwindEx
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapSetInformation
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
LeaveCriticalSection
EnterCriticalSection
HeapFree
GetLocaleInfoA
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
HeapAlloc
HeapReAlloc
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
HeapSize
advapi32
LookupPrivilegeValueW
OpenProcessToken
AdjustTokenPrivileges
shell32
ShellExecuteA
Sections
.text Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 520KB - Virtual size: 528KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ