bootmgr.pdb
Behavioral task
behavioral1
Sample
352f00d2c53b14d500cc182b1e14954df25a6ff9171b50aacd4a981ebe03246a.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
352f00d2c53b14d500cc182b1e14954df25a6ff9171b50aacd4a981ebe03246a.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
db12aacbc394e441e23c1e1d9ce25ca354a554d7362b399e6d0e33770f0e98fe.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
db12aacbc394e441e23c1e1d9ce25ca354a554d7362b399e6d0e33770f0e98fe.exe
Resource
win10v2004-20240802-en
General
-
Target
mallox_poss_18717826374.zip
-
Size
1.4MB
-
MD5
bfea7bb766ed582c9ab1c2d510c7515f
-
SHA1
f7d4c015b49dc50c973498d1c139fbc63c108aa1
-
SHA256
26d9af84cabb56e8755bb9b8fdeb70f731afbb1da70c543effc63450e9a13018
-
SHA512
2b77df777a85fdaf826bbbe0436a95e1e3bf503e02e137065a2a56dbd0be531dafb7527080a5c7e38ef0aa0938d0e9ddd1574c9118dc8c101771b56fd5ef0f81
-
SSDEEP
24576:htcnuAVrmmby7CVRpLoJahQXuxvMsYMMZ9lOFyRyubGEEW1OIfuhFosCKYf:AnuAAOK7Xa0s4ZXOkRyupEW1v2hFosO
Malware Config
Signatures
-
TargetCompany payload 1 IoCs
resource yara_rule static1/unpack001/db12aacbc394e441e23c1e1d9ce25ca354a554d7362b399e6d0e33770f0e98fe family_targetcompany -
Targetcompany family
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/352f00d2c53b14d500cc182b1e14954df25a6ff9171b50aacd4a981ebe03246a unpack001/db12aacbc394e441e23c1e1d9ce25ca354a554d7362b399e6d0e33770f0e98fe
Files
-
mallox_poss_18717826374.zip.zip
Password: infected
-
352f00d2c53b14d500cc182b1e14954df25a6ff9171b50aacd4a981ebe03246a.exe windows:0 windows x64 arch:x64
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Sections
.text Size: 2.5MB - Virtual size: 2.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
TRANSIT Size: 512B - Virtual size: 29B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 271KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
db12aacbc394e441e23c1e1d9ce25ca354a554d7362b399e6d0e33770f0e98fe.exe windows:5 windows x86 arch:x86
3bb9dab2c027dac451afc004583f98e0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenProcess
WideCharToMultiByte
LoadLibraryW
Sleep
LeaveCriticalSection
TerminateProcess
ReadFile
GetModuleFileNameW
CreateFileW
lstrcatA
lstrcmpW
MultiByteToWideChar
GetFileSizeEx
GetLastError
GetProcAddress
MoveFileW
EnterCriticalSection
FindClose
PostQueuedCompletionStatus
DeviceIoControl
GetSystemInfo
WaitForMultipleObjects
Process32NextW
lstrcmpiW
CreateIoCompletionPort
GetModuleHandleA
lstrcatW
FindNextFileW
CreateToolhelp32Snapshot
InitializeCriticalSection
GetDiskFreeSpaceExW
CloseHandle
GetWindowsDirectoryW
LocalFree
lstrcpyW
CreateThread
FindVolumeClose
SetEvent
TerminateThread
FindNextVolumeW
GetVolumePathNamesForVolumeNameW
GetFileType
CreateEventW
QueryDosDeviceW
DuplicateHandle
FindFirstVolumeW
GetCurrentProcessId
WriteFile
GetCurrentThread
GetModuleHandleW
FindFirstFileExW
GetLogicalDrives
WaitForSingleObject
SetFilePointerEx
GetCurrentProcess
GetQueuedCompletionStatus
InterlockedIncrement
SetErrorMode
GetDriveTypeW
lstrlenA
GetComputerNameA
GetCommandLineW
ExitProcess
CreateFileA
GetStringTypeW
DeleteCriticalSection
lstrlenW
GetStringTypeA
LCMapStringW
LCMapStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetProcessHeap
SetEndOfFile
GetLocaleInfoA
FlushFileBuffers
SetStdHandle
IsValidCodePage
HeapFree
HeapAlloc
HeapReAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
VirtualFree
VirtualAlloc
GetStdHandle
GetModuleFileNameA
RtlUnwind
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapSize
RaiseException
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
LoadLibraryA
SetFilePointer
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
advapi32
LsaClose
LsaFreeMemory
AdjustTokenPrivileges
FreeSid
SetEntriesInAclW
AllocateAndInitializeSid
CryptGenRandom
OpenProcessToken
LookupPrivilegeValueW
SetNamedSecurityInfoW
CryptReleaseContext
LsaOpenPolicy
OpenThreadToken
LsaQueryInformationPolicy
CryptAcquireContextW
shell32
ShellExecuteW
CommandLineToArgvW
shlwapi
wvnsprintfW
StrStrIW
SHDeleteKeyW
StrCmpNIW
StrCmpNW
wnsprintfA
wnsprintfW
wininet
InternetOpenW
InternetQueryOptionW
InternetQueryDataAvailable
InternetCrackUrlW
InternetReadFile
InternetConnectW
HttpSendRequestW
HttpOpenRequestW
InternetCloseHandle
InternetSetOptionW
Sections
.text Size: 87KB - Virtual size: 86KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 448B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ