Static task
static1
Behavioral task
behavioral1
Sample
479d0947816467d562bf6d24b295bf50512176a2d3d955b8f4d932aea2378227.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
479d0947816467d562bf6d24b295bf50512176a2d3d955b8f4d932aea2378227.exe
Resource
win10v2004-20240704-en
General
-
Target
479d0947816467d562bf6d24b295bf50512176a2d3d955b8f4d932aea2378227.zip
-
Size
56KB
-
MD5
9d5c77e75df35702acd2350f9fafac7d
-
SHA1
c1e7ebd4ac836e418923a2c50a2aa3425abffbc3
-
SHA256
48af861dbb90de2fc9c5de5506124bb42382e84eac75eb606eaf0bfcda0896af
-
SHA512
d0b5bf7077a722b5e81278df90b005b188b1f3f8ce577a8fe2293357325afab8e41568c39f37e8dfdacfe7059b63f58da1b52607faed900fe9a4a8a2b6d8a00a
-
SSDEEP
1536:/aQ1vdlzqP2ahYT8uTk2rit7ESxVBn9zpny:/a+dlz02ahYlQ2mt7EQVJJ4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/479d0947816467d562bf6d24b295bf50512176a2d3d955b8f4d932aea2378227.exe
Files
-
479d0947816467d562bf6d24b295bf50512176a2d3d955b8f4d932aea2378227.zip.zip
Password: infected
-
479d0947816467d562bf6d24b295bf50512176a2d3d955b8f4d932aea2378227.exe.exe windows:5 windows x86 arch:x86
Password: infected
eeeca2e664e37d06c5365b1185ad4a67
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetQueuedCompletionStatus
ExitThread
PostQueuedCompletionStatus
GlobalAlloc
GlobalFree
CreateThread
GetComputerNameW
CreateIoCompletionPort
CreateTimerQueue
GetCurrentProcess
LocalFree
FindFirstFileW
FindNextFileW
InterlockedDecrement
FindClose
GetSystemInfo
InterlockedIncrement
GetCommandLineW
CreateDirectoryW
DeleteFileW
CreateProcessW
CopyFileW
GetVersionExW
LeaveCriticalSection
CreateToolhelp32Snapshot
LoadLibraryA
Module32FirstW
GetProcAddress
FreeLibrary
FindFirstVolumeW
GetSystemDefaultUILanguage
TerminateProcess
SetFilePointer
GetLocaleInfoW
OpenProcess
GetLogicalDriveStringsW
Process32NextW
EnterCriticalSection
GetNativeSystemInfo
SetVolumeMountPointW
FindVolumeClose
GetVolumePathNamesForVolumeNameW
FindNextVolumeW
GetDriveTypeW
GetModuleHandleW
Sleep
HeapFree
DeleteTimerQueue
WaitForSingleObject
CreateMutexA
lstrlenW
MoveFileW
GetTickCount
lstrcpyW
WideCharToMultiByte
ExitProcess
DeleteCriticalSection
SetFilePointerEx
CloseHandle
lstrcatW
GetLastError
SetFileAttributesW
GetFileAttributesW
CreateFileW
lstrlenA
GetEnvironmentVariableW
InitializeCriticalSection
GetModuleFileNameW
WriteFile
GetFileSizeEx
ReadFile
lstrcmpW
lstrcmpiW
MultiByteToWideChar
CreateTimerQueueTimer
GetProcessHeap
CancelIo
Process32FirstW
HeapAlloc
GetProcessId
user32
SetTimer
CreateMenu
PostQuitMessage
KillTimer
AppendMenuW
SetMenu
MoveWindow
UpdateWindow
CreatePopupMenu
SendMessageW
MessageBoxW
IsWindowVisible
DestroyWindow
GetWindowRect
CreateWindowExW
PostMessageW
GetKeyState
UnregisterHotKey
DefWindowProcW
RegisterHotKey
TranslateMessage
DispatchMessageW
GetMessageW
MessageBoxA
PeekMessageW
UnregisterClassW
EnableWindow
ShowWindow
wvsprintfW
RegisterClassW
gdi32
DeleteObject
CreateFontW
comdlg32
GetOpenFileNameW
advapi32
LookupAccountNameW
GetUserNameW
BuildTrusteeWithSidW
InitializeSecurityDescriptor
OpenProcessToken
GetNamedSecurityInfoW
SetNamedSecurityInfoW
SetEntriesInAclW
SetSecurityDescriptorOwner
AdjustTokenPrivileges
SetSecurityDescriptorDacl
LookupPrivilegeValueW
CryptReleaseContext
CryptGenRandom
CryptAcquireContextA
RegSetValueExW
RegCloseKey
RegCreateKeyA
CheckTokenMembership
FreeSid
AllocateAndInitializeSid
QueryServiceStatusEx
OpenServiceW
EnumDependentServicesW
ControlService
OpenSCManagerW
CloseServiceHandle
shell32
SHGetPathFromIDListW
ShellExecuteW
SHBrowseForFolderW
DragAcceptFiles
SHGetMalloc
DragQueryFileW
SHGetSpecialFolderPathW
SHEmptyRecycleBinW
CommandLineToArgvW
ole32
CoSetProxyBlanket
CoInitializeSecurity
CoInitializeEx
CoTaskMemFree
CoUninitialize
CoCreateInstance
oleaut32
VariantInit
VariantClear
shlwapi
StrStrIA
StrCmpNW
StrStrIW
StrToIntW
StrStrA
iphlpapi
GetIpNetTable
netapi32
NetApiBufferFree
NetShareEnum
mpr
WNetOpenEnumW
WNetEnumResourceW
WNetCloseEnum
ws2_32
WSAGetLastError
setsockopt
freeaddrinfo
htons
getsockopt
gethostname
inet_ntoa
WSAAddressToStringW
socket
WSAStartup
getaddrinfo
WSASocketW
shutdown
gethostbyname
closesocket
WSAIoctl
bind
WSACleanup
wininet
InternetReadFile
InternetCloseHandle
InternetOpenW
InternetOpenUrlW
comctl32
ord17
Sections
.text Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ