Static task
static1
Behavioral task
behavioral1
Sample
mẫu4.exe
Resource
win7-20240708-en
General
-
Target
mẫu4.exe
-
Size
5.2MB
-
MD5
f9f49ccc3fd51fb6dd599acb115eebf2
-
SHA1
ebd2a58d350b12582bfda903cf730b4bec589b93
-
SHA256
56d2c4d023eb2596e1da4a0176b411dbcc63d8f70f6d18e069ce378a7730faca
-
SHA512
40657317505a3bd544fc62f1b924b8b23e048dda74c5be8c786dfa71083b498690b4d9584193052fde2b0f57326c1338b2e33c977afd87065377cf831a07e696
-
SSDEEP
98304:KyKzITdO3LoR3JO/qdZGtQUScCt4+UwxpYNd/6FlMz7mUkaPWoFE:9VO3HLjtWOdyFl2EaeaE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource mẫu4.exe
Files
-
mẫu4.exe.exe windows:4 windows x64 arch:x64
Password: infected
fbd054754007fe3a9327ba02c99e1f56
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
RegDeleteKeyExW
RegEnumKeyW
RegCloseKey
RegEnumValueW
RegQueryValueExW
RegSetValueExW
RegDeleteValueW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegOpenKeyExW
RegCreateKeyExW
shell32
ShellExecuteExW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetFileInfoW
SHFileOperationW
ord147
ole32
OleUninitialize
OleInitialize
CoCreateInstance
CoTaskMemFree
comctl32
ImageList_Destroy
ord17
ImageList_AddMasked
ImageList_Create
user32
RegisterClassW
SystemParametersInfoW
CreateWindowExW
GetClassInfoW
DialogBoxParamW
SetWindowPos
IsWindowEnabled
SetClassLongPtrW
GetSystemMenu
EnableMenuItem
EndDialog
GetSystemMetrics
CreatePopupMenu
AppendMenuW
GetWindowRect
TrackPopupMenu
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
IsWindowVisible
CallWindowProcW
GetMessagePos
ScreenToClient
CheckDlgButton
LoadCursorW
SetCursor
SetDlgItemTextW
GetSysColor
CharNextW
ExitWindowsEx
DestroyWindow
CreateDialogParamW
SetTimer
SetWindowTextW
PostQuitMessage
SetForegroundWindow
ShowWindow
wsprintfW
SendMessageTimeoutW
FindWindowExW
IsWindow
GetDlgItem
SetWindowLongPtrW
LoadImageW
GetDC
ReleaseDC
EnableWindow
InvalidateRect
SendMessageW
DefWindowProcW
BeginPaint
GetClientRect
FillRect
DrawTextW
EndPaint
GetDlgItemTextW
CharPrevW
PeekMessageW
DispatchMessageW
GetWindowLongPtrW
MessageBoxIndirectW
gdi32
SelectObject
SetBkColor
GetDeviceCaps
SetTextColor
SetBkMode
CreateFontIndirectW
DeleteObject
CreateBrushIndirect
kernel32
GetModuleHandleA
GetExitCodeProcess
WaitForSingleObject
GetProcAddress
GetSystemDirectoryW
lstrcatW
MoveFileExW
WriteFile
GetTempFileNameW
CreateFileW
CreateProcessW
CreateDirectoryW
GetUserDefaultUILanguage
CreateThread
GlobalLock
GlobalUnlock
GetDiskFreeSpaceExW
WideCharToMultiByte
lstrcpynW
lstrlenW
SetErrorMode
GetVersionExW
RemoveDirectoryW
GetTempPathW
GetWindowsDirectoryW
SetEnvironmentVariableW
ExitProcess
CopyFileW
GetCurrentProcess
GetModuleFileNameW
GetFileSize
GetLastError
GetTickCount
Sleep
SetFileAttributesW
GetFileAttributesW
SetCurrentDirectoryW
MoveFileW
GetFullPathNameW
GetShortPathNameW
SearchPathW
CompareFileTime
SetFileTime
CloseHandle
lstrcmpiW
lstrcmpW
ExpandEnvironmentStringsW
GlobalAlloc
GlobalFree
GetModuleHandleW
LoadLibraryExW
FreeLibrary
WritePrivateProfileStringW
GetPrivateProfileStringW
lstrlenA
ReadFile
MultiByteToWideChar
SetFilePointer
FindClose
FindNextFileW
FindFirstFileW
DeleteFileW
MulDiv
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
CreateEventW
ResetEvent
WaitForMultipleObjects
SetEvent
GetCommandLineW
Sections
.text Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ndata Size: - Virtual size: 100KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
qv32q3q23/1.jpg.jpg
Password: infected
-
qv32q3q23/Cheap3DView.h
-
qv32q3q23/Cheap3DViewCommands.cpp
-
qv32q3q23/Cheap3DViewControl.cpp
-
qv32q3q23/Cheap3DViewLaser.cpp
-
qv32q3q23/Cheap3DViewPalette.cpp
-
qv32q3q23/Cheap3DViewToolbar.cpp
-
qv32q3q23/ColoredStatusBarCtrl.cpp
-
qv32q3q23/ColoredStatusBarCtrl.h
-
qv32q3q23/CommandLine.cpp
-
qv32q3q23/CommandLine.h