Static task
static1
Behavioral task
behavioral1
Sample
45a236e7aa80515aafb6c656c758faad6e77fb435b35bfa407aef3918212078d.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
45a236e7aa80515aafb6c656c758faad6e77fb435b35bfa407aef3918212078d.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
45a236e7aa80515aafb6c656c758faad6e77fb435b35bfa407aef3918212078d.exe
Resource
win11-20240508-en
General
-
Target
45a236e7aa80515aafb6c656c758faad6e77fb435b35bfa407aef3918212078d.zip
-
Size
233KB
-
MD5
d7ba77995a3fc69eadbbfecf3dc5508e
-
SHA1
8468b22d2bfd63e98582f1575b9c1b50ad18f80f
-
SHA256
e43f3cfaa08de9025f4cf1d806c543785b87f36308989ab2fe5df37e340d0374
-
SHA512
29d8c258da4e061084d82599a7a6d2b4e3aa2c6663f95451ff23fa0983ff0f9172877eb57f864496534047a40edab58619159aed393707457a9bd35ba3bb8587
-
SSDEEP
6144:qS5LbOLHDpOrZ/gv4DEAlc2Gj8SaVmabSciX3iKk7:pFyxOrZ/pDl7i8JVmkdiX9m
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/45a236e7aa80515aafb6c656c758faad6e77fb435b35bfa407aef3918212078d.exe
Files
-
45a236e7aa80515aafb6c656c758faad6e77fb435b35bfa407aef3918212078d.zip.zip
Password: infected
-
45a236e7aa80515aafb6c656c758faad6e77fb435b35bfa407aef3918212078d.exe.exe windows:6 windows x64 arch:x64
Password: infected
cbe53f46121d600d26965890ee97a94a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
TerminateThread
LoadLibraryA
CloseHandle
GetNativeSystemInfo
CreateThread
SetVolumeMountPointW
GetProcAddress
LocalFree
DeleteCriticalSection
ExitProcess
GetCurrentProcessId
GetModuleHandleW
CopyFileW
GetVolumePathNamesForVolumeNameW
lstrcpyW
SleepEx
GetDiskFreeSpaceExA
CreateEventA
FindNextVolumeW
lstrcmpiW
CreateIoCompletionPort
GetTickCount
lstrcmpW
GetDriveTypeW
GetComputerNameA
TerminateProcess
OpenProcess
CreateToolhelp32Snapshot
Process32NextW
QueryDosDeviceW
GetFinalPathNameByHandleW
K32GetModuleFileNameExW
DuplicateHandle
CreateEventW
GetWindowsDirectoryW
FindVolumeClose
GetFileType
GetTickCount64
GetCurrentThread
GetSystemTimeAsFileTime
ReadFile
GetFileSizeEx
SetEndOfFile
SetFileAttributesW
SetFilePointerEx
SleepConditionVariableCS
WakeConditionVariable
InitializeConditionVariable
GetSystemInfo
GlobalMemoryStatusEx
WriteConsoleW
ReadConsoleW
HeapSize
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
GetDiskFreeSpaceExW
SetEvent
GetLastError
Sleep
MultiByteToWideChar
PostQueuedCompletionStatus
GetLocaleInfoA
GetModuleHandleA
GetCurrentThreadId
GetFileAttributesW
CreateFileW
WaitForSingleObject
FindClose
lstrlenA
GetQueuedCompletionStatus
SetErrorMode
InitializeCriticalSection
LeaveCriticalSection
WaitForMultipleObjects
GetModuleFileNameW
GetUserDefaultLangID
WriteFile
lstrlenW
GetCurrentProcess
FindNextFileW
GetCommandLineW
EnterCriticalSection
FindFirstVolumeW
FindFirstFileExW
GetLogicalDrives
MoveFileW
OutputDebugStringW
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
FlsFree
QueryPerformanceCounter
lstrcatW
FlsSetValue
FlsGetValue
FlsAlloc
HeapAlloc
HeapFree
HeapReAlloc
GetStdHandle
GetModuleHandleExW
LoadLibraryExW
FreeLibrary
TlsFree
TlsSetValue
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
GetStringTypeW
WideCharToMultiByte
InitializeCriticalSectionEx
EncodePointer
DecodePointer
LCMapStringEx
GetCPInfo
RtlUnwindEx
RtlPcToFileHeader
RaiseException
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
user32
DefWindowProcW
GetCursorPos
CreateWindowExW
RegisterClassW
MessageBoxW
advapi32
OpenServiceW
CryptReleaseContext
OpenThreadToken
AllocateAndInitializeSid
SetEntriesInAclW
SetNamedSecurityInfoW
FreeSid
ControlService
EnumDependentServicesW
QueryServiceConfigW
ChangeServiceConfigW
EnumServicesStatusW
QueryServiceStatusEx
LookupPrivilegeValueW
AdjustTokenPrivileges
CreateServiceW
RegCloseKey
CryptAcquireContextW
CloseServiceHandle
RegQueryValueExA
CryptGenRandom
OpenSCManagerW
RegSetValueExW
OpenProcessToken
StartServiceW
RegOpenKeyExA
RegOpenKeyExW
GetTokenInformation
shell32
CommandLineToArgvW
ShellExecuteW
bcrypt
BCryptGenRandom
netapi32
NetShareEnum
NetApiBufferFree
shlwapi
wnsprintfA
StrCmpNIW
StrCmpNW
StrStrIW
PathFileExistsW
SHDeleteKeyW
UrlUnescapeA
UrlEscapeA
wnsprintfW
iphlpapi
GetIpNetTable
ws2_32
inet_ntoa
wininet
InternetQueryOptionW
HttpOpenRequestW
InternetOpenW
InternetCloseHandle
InternetConnectW
InternetSetOptionW
HttpSendRequestW
InternetCrackUrlW
InternetReadFile
InternetQueryDataAvailable
Sections
.text Size: 325KB - Virtual size: 325KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 125KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ