Static task
static1
Behavioral task
behavioral1
Sample
Mappe/BewerbungPDF.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Mappe/BewerbungPDF.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Mappe/BewerbungsmappePDF.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Mappe/BewerbungsmappePDF.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Mappe/UnterlagenPDF.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
Mappe/UnterlagenPDF.exe
Resource
win10v2004-20240709-en
General
-
Target
VirusShare_2fda2ebb0c9b7831b1427f30d1cf1128
-
Size
1.8MB
-
MD5
2fda2ebb0c9b7831b1427f30d1cf1128
-
SHA1
01281852197176fc23cc2817d95975e3c62a9163
-
SHA256
b4bd520791631d4c90923e4737213f2bffb452649055e1322ad9ad8fcd6057fd
-
SHA512
4318e34da1bb215f7dcaf647f2e058fd350c1a1b4b437b4a1913bce91a6f4048adebba7805f5142b31fd9d1ecc24e3311ea25db98e26e3e0945d5d036764755b
-
SSDEEP
49152:7ozQtAK4Rdn6yQ3xm+byeZAPwyV8l9DZDzg+2Wxi:7ySX4/6yQ3xFyeZAPwyV8l9D++Jxi
Malware Config
Signatures
-
Unsigned PE 3 IoCs
Checks for missing Authenticode signature.
resource unpack001/Mappe/BewerbungPDF.exe unpack001/Mappe/BewerbungsmappePDF.exe unpack001/Mappe/UnterlagenPDF.exe
Files
-
VirusShare_2fda2ebb0c9b7831b1427f30d1cf1128.zip
-
Mappe/BewerbungPDF.exe.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 609KB - Virtual size: 608KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 5KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 159KB - Virtual size: 159KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
Mappe/Bewerbungsfoto.jpg.jpg
-
Mappe/BewerbungsmappePDF.exe.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 609KB - Virtual size: 608KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 5KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 159KB - Virtual size: 159KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
Mappe/FotoUnterlagen.jpg.jpg
-
Mappe/FotofuerBewerbung.jpg.jpg
-
Mappe/UnterlagenPDF.exe.exe windows:5 windows x86 arch:x86
c1f9fe382b2936f64b656867eee5f474
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
setupapi
SetupOpenInfFileA
SetupInstallFromInfSectionA
SetupCloseInfFile
SetupDiOpenClassRegKey
kernel32
GetCommandLineW
DefineDosDeviceA
GetCurrentProcessId
FormatMessageW
VirtualQuery
ReleaseMutex
CreateMutexA
OpenMutexA
GetVolumeInformationW
QueryPerformanceCounter
QueryPerformanceFrequency
GetLogicalDrives
FlushFileBuffers
GetFileSize
GetCurrentProcess
GetProcAddress
GetModuleHandleA
GetVersionExA
GetCurrentDirectoryA
LockResource
SizeofResource
LoadResource
FindResourceA
GetFileAttributesA
FindFirstFileA
SetFilePointer
GetModuleFileNameW
SetCurrentDirectoryA
QueryDosDeviceA
FindNextFileA
UnhandledExceptionFilter
GetSystemInfo
LoadLibraryA
WaitForSingleObject
GetCurrentThread
SetUnhandledExceptionFilter
SetErrorMode
InterlockedExchangeAdd
InterlockedExchange
SetEvent
ResetEvent
CreateEventA
FreeLibrary
SetThreadPriority
SetEndOfFile
DeleteVolumeMountPointA
SetVolumeMountPointA
GetVolumeNameForVolumeMountPointA
GetFileAttributesExA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetStartupInfoA
GetProcessWorkingSetSize
GetProcessTimes
GetThreadTimes
GlobalMemoryStatus
GetProcessHeap
InitializeCriticalSection
LocalFree
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeA
GetLocaleInfoA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
PeekNamedPipe
GetFullPathNameA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
HeapSize
IsValidCodePage
GetOEMCP
GetACP
InitializeCriticalSectionAndSpinCount
SetHandleCount
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStdHandle
GetStringTypeW
GetCPInfo
LCMapStringW
LCMapStringA
GetCommandLineA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetConsoleMode
GetConsoleCP
GetFileType
SetStdHandle
GetSystemTimeAsFileTime
GetFileAttributesW
SetFileAttributesA
CreateThread
ResumeThread
ExitThread
ExitProcess
GetModuleHandleW
RtlUnwind
IsDebuggerPresent
TerminateProcess
HeapAlloc
HeapFree
RaiseException
InterlockedCompareExchange
FindFirstVolumeW
QueryDosDeviceW
FindNextVolumeW
FindVolumeClose
GetShortPathNameA
GetDriveTypeA
SetEnvironmentVariableA
CreateDirectoryA
GetTempPathA
GetSystemDirectoryA
MultiByteToWideChar
DeleteFileA
CopyFileA
lstrlenW
WideCharToMultiByte
GetTickCount
GetModuleFileNameA
GetDiskFreeSpaceA
GetVolumePathNameA
GetDiskFreeSpaceExA
GetFileSizeEx
GetFileTime
GetFileInformationByHandle
SetFileTime
SetThreadExecutionState
FindFirstFileW
CreateFileW
FindNextFileW
GetVolumeInformationA
CreateFileA
CloseHandle
FindClose
ReadFile
WriteFile
Sleep
VirtualLock
SetFilePointerEx
GetLastError
VirtualUnlock
SetLastError
DeviceIoControl
SetProcessShutdownParameters
GetCurrentThreadId
InterlockedIncrement
InterlockedDecrement
IsValidLocale
GetLocaleInfoW
GetTimeZoneInformation
CompareStringA
CompareStringW
user32
wsprintfA
SendMessageTimeoutA
SystemParametersInfoW
GetSystemMenu
AppendMenuA
AppendMenuW
TrackMouseEvent
CreateWindowExA
GetClipboardViewer
SendDlgItemMessageA
GetKeyState
EnumChildWindows
GetDlgCtrlID
GetClassNameA
SendMessageW
SetForegroundWindow
GetClassInfoA
SetDlgItemTextW
SendDlgItemMessageW
UnhookWindowsHookEx
CallNextHookEx
GetCursorPos
GetCaretPos
GetQueueStatus
GetProcessWindowStation
GetMessageTime
GetOpenClipboardWindow
GetMessagePos
GetInputState
GetFocus
RegisterClassExA
GetDesktopWindow
PostThreadMessageA
DispatchMessageA
TranslateMessage
GetClipboardOwner
GetCapture
SetWindowsHookExA
SetLayeredWindowAttributes
LoadCursorA
SetCursor
DefDlgProcA
UnregisterClassA
LoadIconA
RegisterClassA
GetUpdateRect
BeginPaint
DefWindowProcA
GetDialogBaseUnits
EndPaint
LoadBitmapA
SetWindowLongA
CallWindowProcA
GetWindowTextW
GetClientRect
GetSystemMetrics
GetWindowInfo
SetWindowPos
GetDC
ReleaseDC
MessageBoxA
GetActiveWindow
KillTimer
GetAsyncKeyState
DestroyWindow
GetWindowRect
CreateDialogParamW
MapDialogRect
MoveWindow
GetKeyboardLayout
LoadKeyboardLayoutA
ShowWindow
SetDlgItemTextA
GetWindowTextLengthA
InvalidateRect
GetDlgItemTextA
DialogBoxParamW
MessageBeep
GetParent
MessageBoxW
SetFocus
PeekMessageA
SetTimer
EnableWindow
SendMessageA
SetWindowTextW
IsWindow
EndDialog
GetDlgItem
EnumWindows
GetWindowLongA
GetWindowTextA
PostMessageA
SetWindowTextA
wsprintfW
GetMessageA
ExitWindowsEx
gdi32
GetStockObject
CreatePen
MoveToEx
LineTo
GetCurrentObject
GetObjectA
CreateCompatibleBitmap
CreateFontIndirectW
StretchBlt
DeleteObject
GetTextMetricsA
GetTextExtentPoint32W
SelectObject
GetDeviceCaps
SetMapMode
CreateCompatibleDC
BitBlt
SetStretchBltMode
DeleteDC
comdlg32
GetSaveFileNameW
GetOpenFileNameW
advapi32
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
CryptAcquireContextA
CryptGenRandom
CryptReleaseContext
GetTokenInformation
IsWellKnownSid
QueryServiceStatus
ControlService
StartServiceA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
ChangeServiceConfigA
OpenSCManagerA
CreateServiceA
ChangeServiceConfig2A
OpenServiceA
CloseServiceHandle
DeleteService
shell32
DragQueryFileA
DragFinish
ShellExecuteW
SHChangeNotify
ord680
SHGetFileInfoA
SHGetMalloc
SHBrowseForFolderW
SHGetPathFromIDListA
CommandLineToArgvW
SHGetFolderPathA
ShellExecuteA
DragAcceptFiles
ole32
CoCreateInstance
StringFromGUID2
CoGetObject
CoInitialize
CoUninitialize
CoRegisterClassObject
CoRevokeClassObject
oleaut32
SysAllocStringLen
SysAllocStringByteLen
SysFreeString
SysStringByteLen
Sections
.text Size: 566KB - Virtual size: 565KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 138KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 27KB - Virtual size: 204KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 890KB - Virtual size: 890KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ