Overview
overview
10Static
static
318111679543.zip
windows7-x64
118111679543.zip
windows10-2004-x64
105212423bac...1a.exe
windows7-x64
105212423bac...1a.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3Spitten.cla
windows7-x64
3Spitten.cla
windows10-2004-x64
3Svangerska...en.cri
windows7-x64
3Svangerska...en.cri
windows10-2004-x64
3computerspillets.txt
windows7-x64
1computerspillets.txt
windows10-2004-x64
1disusance.nar
windows7-x64
3disusance.nar
windows10-2004-x64
3Static task
static1
Behavioral task
behavioral1
Sample
18111679543.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
18111679543.zip
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
5212423bac835b8c3268e4cf2b195043bdcd403e7d98f9182830098585ef2d1a.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
5212423bac835b8c3268e4cf2b195043bdcd403e7d98f9182830098585ef2d1a.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
Spitten.cla
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
Spitten.cla
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
Svangerskabsafbrydelsen.cri
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
Svangerskabsafbrydelsen.cri
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
computerspillets.txt
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
computerspillets.txt
Resource
win10v2004-20240704-en
Behavioral task
behavioral15
Sample
disusance.nar
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
disusance.nar
Resource
win10v2004-20240709-en
General
-
Target
18111679543.zip
-
Size
496KB
-
MD5
6ecdb3120201be3f3d961a09aa7020f6
-
SHA1
ba7f6d86692c1504377f066f919a4c77840ae732
-
SHA256
59efcbd307dae16a828425d1fd4b362908b180e9f55b59c0180138aa2e2688b7
-
SHA512
640093238aacf54d473832b64fc1a4009392ca3718751b50115b76b016eeb4ae1f58013db6a892c1de74fb26a45c1af16736e4d7375b90cca200538c62de7446
-
SSDEEP
6144:jmnVO9REMP80d/j5M4AChL6sMpQLjr0ZweL3n0CpVLa0woTyq/l86+DuFQvWUfTY:CnVO3EMr9CcZMW1c3AtbacuFQWUf8
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack002/$PLUGINSDIR/System.dll unpack002/$PLUGINSDIR/nsExec.dll -
NSIS installer 2 IoCs
resource yara_rule static1/unpack001/5212423bac835b8c3268e4cf2b195043bdcd403e7d98f9182830098585ef2d1a nsis_installer_1 static1/unpack001/5212423bac835b8c3268e4cf2b195043bdcd403e7d98f9182830098585ef2d1a nsis_installer_2
Files
-
18111679543.zip.zip
Password: infected
-
5212423bac835b8c3268e4cf2b195043bdcd403e7d98f9182830098585ef2d1a.exe windows:5 windows x86 arch:x86
Password: infected
f677acae05efabe7411a40902b2d88fb
Code Sign
13:f1:c7:54:5d:44:0c:80:a2:d0:99:75:bd:a9:da:cb:d8:52:e5:b0Certificate
IssuerCN=Nonsuccessive,OU=Indpakkende Disinfections transmigratory\ ,O=Nonsuccessive,L=Miami,ST=Florida,C=US,1.2.840.113549.1.9.1=#0c1d50726f7068796c616374696373405376616768656465726e65732e496dNot Before17/08/2023, 02:40Not After16/08/2026, 02:40SubjectCN=Nonsuccessive,OU=Indpakkende Disinfections transmigratory\ ,O=Nonsuccessive,L=Miami,ST=Florida,C=US,1.2.840.113549.1.9.1=#0c1d50726f7068796c616374696373405376616768656465726e65732e496d4e:9f:63:08:9d:c1:e2:fc:52:0a:9e:9d:ef:08:08:7f:a3:53:e8:9b:32:10:39:13:5d:03:d9:be:f4:3f:3f:1bSigner
Actual PE Digest4e:9f:63:08:9d:c1:e2:fc:52:0a:9e:9d:ef:08:08:7f:a3:53:e8:9b:32:10:39:13:5d:03:d9:be:f4:3f:3f:1bDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyA
RegEnumValueA
RegQueryValueExA
RegSetValueExA
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueA
SetFileSecurityA
RegCreateKeyExA
RegOpenKeyExA
shell32
SHBrowseForFolderA
SHFileOperationA
SHGetPathFromIDListA
SHGetFileInfoA
ShellExecuteExA
ole32
OleUninitialize
IIDFromString
OleInitialize
CoTaskMemFree
CoCreateInstance
comctl32
ord17
ImageList_Destroy
ImageList_AddMasked
ImageList_Create
user32
DispatchMessageA
SystemParametersInfoA
LoadCursorA
SetClassLongA
GetSysColor
ScreenToClient
SetCursor
GetWindowRect
TrackPopupMenu
AppendMenuA
EnableMenuItem
CreatePopupMenu
GetSystemMenu
GetSystemMetrics
IsWindowEnabled
EmptyClipboard
SetClipboardData
CloseClipboard
OpenClipboard
CheckDlgButton
EndDialog
DialogBoxParamA
IsWindowVisible
SetWindowPos
CreateWindowExA
GetClassInfoA
RegisterClassA
PeekMessageA
GetMessagePos
CharNextA
ExitWindowsEx
SetWindowTextA
SetTimer
CreateDialogParamA
DestroyWindow
LoadImageA
FindWindowExA
SetWindowLongA
InvalidateRect
ReleaseDC
GetDC
SetForegroundWindow
EnableWindow
GetDlgItem
ShowWindow
IsWindow
PostQuitMessage
SendMessageTimeoutA
SendMessageA
wsprintfA
FillRect
GetClientRect
EndPaint
BeginPaint
DrawTextA
DefWindowProcA
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CallWindowProcA
CharPrevA
GetWindowLongA
gdi32
SetBkMode
CreateBrushIndirect
GetDeviceCaps
SelectObject
DeleteObject
SetBkColor
SetTextColor
CreateFontIndirectA
kernel32
GetTempFileNameA
GetLastError
WaitForSingleObject
RemoveDirectoryA
ReadFile
CreateFileA
CreateDirectoryA
lstrcpynA
GlobalLock
GlobalUnlock
CreateThread
GetDiskFreeSpaceA
CopyFileA
lstrlenA
GetVersionExA
GetWindowsDirectoryA
ExitProcess
GetExitCodeProcess
SetErrorMode
GetTempPathA
SetEnvironmentVariableA
GetCommandLineA
GetModuleFileNameA
GetTickCount
GetFileSize
MultiByteToWideChar
MoveFileA
WritePrivateProfileStringA
GetPrivateProfileStringA
lstrcmpiA
lstrcmpA
MulDiv
GetShortPathNameA
GlobalFree
GlobalAlloc
LoadLibraryExA
GetModuleHandleA
FreeLibrary
Sleep
CloseHandle
SetFileTime
SetFilePointer
SetFileAttributesA
GetFullPathNameA
GetFileAttributesA
FindNextFileA
FindFirstFileA
FindClose
DeleteFileA
CompareFileTime
SearchPathA
SetCurrentDirectoryA
ExpandEnvironmentStringsA
WriteFile
CreateProcessA
WideCharToMultiByte
GetSystemDirectoryA
GetProcAddress
lstrcpyA
lstrcatA
MoveFileExA
GetCurrentProcess
Sections
.text Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 3.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ndata Size: - Virtual size: 108KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 424KB - Virtual size: 423KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
$PLUGINSDIR/System.dll.dll windows:6 windows x86 arch:x86
Password: infected
595a3fd71239f605bb02d7a5e48fd4df
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GlobalAlloc
GlobalSize
GlobalFree
lstrcpynA
lstrcpyA
GetLastError
VirtualAlloc
VirtualProtect
VirtualFree
FreeLibrary
GetModuleHandleA
GetProcAddress
LoadLibraryA
lstrlenA
MultiByteToWideChar
WideCharToMultiByte
user32
wsprintfA
ole32
StringFromGUID2
CLSIDFromString
Exports
Exports
Alloc
Call
Copy
Free
Get
Int64Op
Store
StrAlloc
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 926B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 68B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 492B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
$PLUGINSDIR/nsExec.dll.dll windows:6 windows x86 arch:x86
Password: infected
0d6ae1f1ecbace583969d8eb8b21d1b8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
advapi32
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
user32
FindWindowExA
CharNextExA
CharPrevA
CharNextA
OemToCharBuffA
SendMessageA
wsprintfA
kernel32
CopyFileA
GetStartupInfoA
CreateFileMappingA
lstrlenA
lstrcatA
lstrcpyA
lstrcpynA
GetCommandLineA
CreateFileA
DeleteFileA
ReadFile
GetTempFileNameA
CloseHandle
CreatePipe
PeekNamedPipe
WaitForSingleObject
Sleep
GetCurrentProcess
ExitProcess
TerminateProcess
GetExitCodeProcess
CreateProcessA
GetVersion
GetTickCount
MapViewOfFile
UnmapViewOfFile
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GlobalAlloc
GlobalReAlloc
GlobalFree
lstrcmpiA
Exports
Exports
Exec
ExecToLog
ExecToStack
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Spitten.Cla
-
Svangerskabsafbrydelsen.Cri
-
computerspillets.txt
-
disusance.nar