ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
96e32ff5d24ed023c55e00556cedaada45db32f94229cf9d33f55a2886ac0c69.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
96e32ff5d24ed023c55e00556cedaada45db32f94229cf9d33f55a2886ac0c69.dll
Resource
win10v2004-20240709-en
General
-
Target
89b0ea5bee33a5b8786221b8d5980e9e.bin
-
Size
43KB
-
MD5
03c1882fbfeab89b9d859417fc39cc40
-
SHA1
3e46633ffc98fb3826cc7c2ade857ac904bd9a65
-
SHA256
7faadff77db7532f764c100302390e99284b2956536bd33e6bbb62c8dc623765
-
SHA512
2114f200cba041514a9cdc5c6a8f518e8a173ff71a2bc63781bbadc9da1baead76a63a45121ab8f16b0892a9e2000fba90c1b42c00ef9cfa5c72f656e817006c
-
SSDEEP
768:VbcMr5fdSevgHfieqUfCXkOFxOdXbLpmfmvhcrkxgQXlEv3CN92WNt857cGtip:f6kOCUSEzmfmvh9XeS5OD+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/96e32ff5d24ed023c55e00556cedaada45db32f94229cf9d33f55a2886ac0c69.exe
Files
-
89b0ea5bee33a5b8786221b8d5980e9e.bin.zip
Password: infected
-
96e32ff5d24ed023c55e00556cedaada45db32f94229cf9d33f55a2886ac0c69.exe.dll windows:6 windows x64 arch:x64
Password: infected
c5478df28298b54a42b5505f02eb252e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
kernel32
CreateFileW
GetStringTypeW
WriteConsoleW
LCMapStringEx
CreateThread
Sleep
GetProcAddress
GetLastError
LoadLibraryW
OutputDebugStringW
HeapReAlloc
LoadLibraryExW
FlushFileBuffers
SetStdHandle
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
EncodePointer
DecodePointer
GetCommandLineA
GetCurrentThreadId
IsDebuggerPresent
IsProcessorFeaturePresent
HeapFree
HeapAlloc
RtlPcToFileHeader
RaiseException
EnterCriticalSection
LeaveCriticalSection
RtlUnwindEx
InitializeCriticalSectionAndSpinCount
GetStdHandle
GetFileType
DeleteCriticalSection
InitOnceExecuteOnce
GetStartupInfoW
CloseHandle
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
HeapSize
WriteFile
GetModuleFileNameW
SetLastError
GetProcessHeap
GetModuleFileNameA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetTickCount64
GetEnvironmentStringsW
FreeEnvironmentStringsW
WideCharToMultiByte
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetCurrentProcess
TerminateProcess
GetModuleHandleW
GetConsoleCP
GetConsoleMode
SetFilePointerEx
user32
TranslateMessage
DefWindowProcA
LoadIconA
LoadCursorA
RegisterClassA
CreateWindowExA
ShowWindow
UpdateWindow
DispatchMessageA
wsprintfW
GetMessageA
gdi32
GetStockObject
advapi32
SetServiceStatus
RegSetValueExA
StartServiceA
OpenServiceA
CloseServiceHandle
GetServiceDisplayNameA
OpenSCManagerA
RegCloseKey
RegSetValueExW
RegCreateKeyA
RegOpenKeyExA
RegisterServiceCtrlHandlerW
winhttp
WinHttpConnect
WinHttpCloseHandle
WinHttpOpenRequest
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpQueryDataAvailable
WinHttpReadData
WinHttpOpen
netapi32
NetUserSetInfo
NetLocalGroupAddMembers
NetUserAdd
NetUserDel
Exports
Exports
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ