Static task
static1
Behavioral task
behavioral1
Sample
4fb6dd11e723209d12b2d503a9fcf94d8fed6084aceca390ac0b7e7da1874f50.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4fb6dd11e723209d12b2d503a9fcf94d8fed6084aceca390ac0b7e7da1874f50.exe
Resource
win10v2004-20240802-en
General
-
Target
18459446109.zip
-
Size
138KB
-
MD5
50eb0a621a932c182f57e9859b02ed83
-
SHA1
7a77bc46a18faf45c2d44a9077037e631a3d0856
-
SHA256
3b759d37a23540092ca638ae919598e6afcab7ea9bdcc67e37769eeae3df19c2
-
SHA512
ca474927fd02b8c643e489b0a148a81720d50bce99aa0f47c7e21d3ccd69ae7e02907a668b80530185a17d823a6f773140c6575846eedf45b12a42a4f77da8a3
-
SSDEEP
3072:K8jlX3XHktp7k2mdvLLHlUpNSkkyEZE+51frGML9xbgM1Vgb:7J3XgbOvOpNfkyME+LGO9Ng3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/4fb6dd11e723209d12b2d503a9fcf94d8fed6084aceca390ac0b7e7da1874f50
Files
-
18459446109.zip.zip
Password: infected
-
4fb6dd11e723209d12b2d503a9fcf94d8fed6084aceca390ac0b7e7da1874f50.exe windows:5 windows x86 arch:x86
68e9a445b8f9891e57ed54c027a96bd0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
dnsapi
DnsQuery_W
DnsFree
ws2_32
inet_ntoa
shlwapi
PathIsDirectoryW
StrStrW
PathFileExistsW
PathAppendW
iphlpapi
GetAdaptersInfo
advapi32
OpenServiceW
CloseServiceHandle
LookupAccountSidA
LookupPrivilegeValueW
QueryServiceStatus
QueryServiceConfigW
OpenSCManagerW
EnumServicesStatusW
OpenProcessToken
AdjustTokenPrivileges
shell32
SHGetSpecialFolderPathW
ShellExecuteW
SHFileOperationW
SHGetFolderPathW
kernel32
SetLastError
WriteFile
ReadFile
SetFilePointer
CloseHandle
SystemTimeToFileTime
GetCurrentDirectoryW
CreateDirectoryW
CreateFileW
MultiByteToWideChar
WideCharToMultiByte
GetFileInformationByHandle
GetFileSize
GetLocalTime
FileTimeToSystemTime
GetTickCount
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
TerminateProcess
TerminateThread
Sleep
CreatePipe
DisconnectNamedPipe
PeekNamedPipe
CreateProcessA
GetStartupInfoA
GetSystemDirectoryA
InterlockedIncrement
InterlockedDecrement
CreateThread
GetLastError
lstrcmpW
lstrlenW
CreateMutexW
GetModuleFileNameW
OutputDebugStringW
DeleteFileW
CopyFileW
lstrcmpiW
VirtualAlloc
VirtualFree
ExitProcess
GetFileSizeEx
HeapReAlloc
TlsAlloc
lstrcpyW
lstrcatW
GetSystemDirectoryW
GetTempPathW
GetTempFileNameW
FindFirstFileW
FindNextFileW
GetVersionExW
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
OpenProcess
GetCurrentProcess
SetErrorMode
WaitForSingleObject
lstrcatA
GetLogicalDriveStringsW
CreateProcessW
ExpandEnvironmentStringsW
GetDriveTypeW
GetTempPathA
GetDiskFreeSpaceExW
CreateFileA
GetProcAddress
GetModuleHandleA
LoadLibraryExW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetModuleFileNameA
SetUnhandledExceptionFilter
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetTimeZoneInformation
GetStringTypeW
SetStdHandle
WriteConsoleW
SetEndOfFile
InitializeCriticalSectionAndSpinCount
LocalFree
SetEnvironmentVariableA
FindClose
DeleteCriticalSection
GetFileType
SetFilePointerEx
ReadConsoleW
GetConsoleMode
UnhandledExceptionFilter
GetCurrentThreadId
HeapSize
GetConsoleCP
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
GetStdHandle
GetProcessHeap
GetModuleHandleW
GetStartupInfoW
TlsFree
TlsGetValue
GetSystemInfo
EncodePointer
DecodePointer
RaiseException
RtlUnwind
IsDebuggerPresent
IsProcessorFeaturePresent
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
EnterCriticalSection
LeaveCriticalSection
GetCommandLineA
GetModuleHandleExW
AreFileApisANSI
TlsSetValue
user32
GetDC
wsprintfW
GetWindowThreadProcessId
GetClassNameW
EnumWindows
GetWindowTextW
GetClientRect
GetWindowTextA
ReleaseDC
GetKeyState
GetForegroundWindow
GetAsyncKeyState
GetActiveWindow
ExitWindowsEx
GetSystemMetrics
wsprintfA
PeekMessageW
DispatchMessageW
GetDesktopWindow
gdi32
CreateCompatibleBitmap
GetObjectW
SetStretchBltMode
StretchBlt
SelectObject
GetDIBits
DeleteObject
CreateCompatibleDC
BitBlt
ole32
CoTaskMemFree
StringFromGUID2
CoCreateInstance
CoInitializeEx
oleaut32
VariantClear
psapi
EnumProcessModules
GetModuleBaseNameW
GetModuleFileNameExW
wtsapi32
WTSFreeMemory
WTSEnumerateProcessesW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
avicap32
capGetDriverDescriptionW
Sections
.text Size: 174KB - Virtual size: 173KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ