Static task
static1
Behavioral task
behavioral1
Sample
0944b17a4330e1c97600f62717d6bae7e4a4260604043f2390a14c8d76ef1507.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
0944b17a4330e1c97600f62717d6bae7e4a4260604043f2390a14c8d76ef1507.exe
Resource
win10v2004-20240802-en
General
-
Target
18481420335.zip
-
Size
138KB
-
MD5
54b0cd4bfdc99f65696abaae7ea8d1bc
-
SHA1
8a37e2b79da70dcb0d6ebba996177ae0805f735a
-
SHA256
92cdc50924b51ed16c07015d2a65770306ef73606263565cecfaff7a40c5643f
-
SHA512
e62eb6181e21e7d3102db561e2674cdcfe0d8a8e9d035a728256f2373a28acaddb8789de978884fb59eaa00af17b558c705b56202d4a56c150f792446f85035d
-
SSDEEP
3072:cHbznopi8bJ4SmxqeLC6fRXzcDpTS+CgSN3tlFY1tSYeA8eH9:MfnX8bJkqyfhgDpuRR7QIYKI9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/0944b17a4330e1c97600f62717d6bae7e4a4260604043f2390a14c8d76ef1507
Files
-
18481420335.zip.zip
Password: infected
-
0944b17a4330e1c97600f62717d6bae7e4a4260604043f2390a14c8d76ef1507.exe windows:5 windows x86 arch:x86
14e984e124ec89f7131f6b7a539d6f8f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
dnsapi
DnsQuery_W
DnsFree
ws2_32
inet_ntoa
shlwapi
PathIsDirectoryW
StrStrW
PathFileExistsW
PathAppendW
iphlpapi
GetAdaptersInfo
advapi32
OpenServiceW
CloseServiceHandle
LookupAccountSidA
LookupPrivilegeValueW
QueryServiceStatus
QueryServiceConfigW
OpenSCManagerW
EnumServicesStatusW
OpenProcessToken
AdjustTokenPrivileges
shell32
SHGetSpecialFolderPathW
SHGetFolderPathW
SHFileOperationW
ShellExecuteW
kernel32
SetLastError
WriteFile
ReadFile
SetFilePointer
CloseHandle
SystemTimeToFileTime
GetCurrentDirectoryW
CreateDirectoryW
CreateFileW
MultiByteToWideChar
WideCharToMultiByte
GetFileInformationByHandle
GetFileSize
GetLocalTime
FileTimeToSystemTime
GetTickCount
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
TerminateProcess
TerminateThread
Sleep
CreatePipe
DisconnectNamedPipe
PeekNamedPipe
CreateProcessA
GetStartupInfoA
GetSystemDirectoryA
InterlockedIncrement
InterlockedDecrement
CreateThread
GetLastError
lstrlenW
CreateMutexW
GetModuleFileNameW
OutputDebugStringW
lstrcmpiW
VirtualAlloc
VirtualFree
ExitProcess
GetFileSizeEx
FindClose
GetSystemInfo
lstrcmpW
HeapReAlloc
TlsAlloc
GetSystemDirectoryW
GetTempPathW
GetTempFileNameW
DeleteFileW
FindFirstFileW
FindNextFileW
GetVersionExW
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
OpenProcess
GetCurrentProcess
SetErrorMode
WaitForSingleObject
lstrcatA
GetLogicalDriveStringsW
CreateProcessW
ExpandEnvironmentStringsW
GetDriveTypeW
GetTempPathA
GetDiskFreeSpaceExW
CreateFileA
CopyFileW
GetProcAddress
GetModuleHandleA
LoadLibraryExW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetModuleFileNameA
SetUnhandledExceptionFilter
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetTimeZoneInformation
GetStringTypeW
SetStdHandle
WriteConsoleW
SetEndOfFile
InitializeCriticalSectionAndSpinCount
LocalFree
SetEnvironmentVariableA
lstrcpyW
DeleteCriticalSection
GetFileType
SetFilePointerEx
ReadConsoleW
GetConsoleMode
UnhandledExceptionFilter
GetCurrentThreadId
HeapSize
GetConsoleCP
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
GetStdHandle
GetProcessHeap
GetModuleHandleW
GetStartupInfoW
TlsFree
TlsGetValue
lstrcatW
EncodePointer
DecodePointer
RaiseException
RtlUnwind
IsDebuggerPresent
IsProcessorFeaturePresent
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
EnterCriticalSection
LeaveCriticalSection
GetCommandLineA
GetModuleHandleExW
AreFileApisANSI
TlsSetValue
user32
GetDC
wsprintfW
GetWindowThreadProcessId
GetClassNameW
EnumWindows
GetWindowTextW
GetClientRect
GetWindowTextA
ReleaseDC
GetKeyState
GetForegroundWindow
GetAsyncKeyState
GetActiveWindow
ExitWindowsEx
GetSystemMetrics
wsprintfA
PeekMessageW
DispatchMessageW
GetDesktopWindow
gdi32
CreateCompatibleBitmap
GetObjectW
SetStretchBltMode
StretchBlt
SelectObject
GetDIBits
DeleteObject
CreateCompatibleDC
BitBlt
ole32
CoTaskMemFree
StringFromGUID2
CoCreateInstance
CoInitializeEx
oleaut32
VariantClear
psapi
EnumProcessModules
GetModuleBaseNameW
GetModuleFileNameExW
wtsapi32
WTSFreeMemory
WTSEnumerateProcessesW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
avicap32
capGetDriverDescriptionW
Sections
.text Size: 174KB - Virtual size: 173KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ