c:\299_Flow\him\bell_opposite\order\Most.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a43b7c1fff94a3a2c9cda875dc21e5bc57819537d1f6b9f9b91271e895201638.dll
Resource
win7-20240708-en
General
-
Target
2901a3d99aeb6d2231f77ed1787a6a44.zip
-
Size
386KB
-
MD5
31799f9f4f00057e6dcea3332bdda8f1
-
SHA1
e8514929dfdd66dacf923409cdf8652524e9164e
-
SHA256
0ed2ce70b17e3c2ab44a041ce022d8ba0dd74bae6a4778071dbba8d1f276c52e
-
SHA512
c732140946123eaa7f8c35038ca0f4613d570cdbc4360054f5633cecf55d55a9963b94a43345f44b96abf0eeab9fc7ee2c68ee473ddb44507198cbd6e287afc0
-
SSDEEP
12288:AlvE7GTSSh6UYKMUiKVjR0sFyRLVqslgl:gE6ph6nc0sFyZ1y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/a43b7c1fff94a3a2c9cda875dc21e5bc57819537d1f6b9f9b91271e895201638
Files
-
2901a3d99aeb6d2231f77ed1787a6a44.zip.zip
Password: infected
-
a43b7c1fff94a3a2c9cda875dc21e5bc57819537d1f6b9f9b91271e895201638.dll windows:4 windows x86 arch:x86
Password: infected
54afd981c141523b8c68b6a5bfed7202
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
FileTimeToLocalFileTime
CreateEventW
GetVersion
FindClose
FindNextFileW
FindFirstFileW
TlsAlloc
GetCurrentDirectoryW
VirtualProtectEx
GetSystemDirectoryW
FindFirstChangeNotificationW
GetWindowsDirectoryW
CompareStringW
CompareStringA
GetLocaleInfoW
HeapSize
GetTimeZoneInformation
LCMapStringW
LCMapStringA
LoadLibraryA
InterlockedExchange
FreeLibrary
SetConsoleCtrlHandler
RtlUnwind
InitializeCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
GetStringTypeW
MultiByteToWideChar
GetStringTypeA
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
Sleep
HeapAlloc
GetLastError
HeapFree
InterlockedIncrement
InterlockedDecrement
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
DeleteCriticalSection
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetProcAddress
GetModuleHandleA
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetCPInfo
GetTimeFormatA
GetDateFormatA
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThread
GetACP
GetOEMCP
SetEnvironmentVariableA
user32
BeginDeferWindowPos
DeferWindowPos
GetPropW
TranslateMessage
UnregisterHotKey
CreateMenu
RegisterWindowMessageW
winscard
SCardReconnect
SCardLocateCardsByATRW
SCardListReaderGroupsW
SCardIsValidContext
SCardGetStatusChangeW
SCardGetAttrib
SCardEstablishContext
SCardAccessStartedEvent
SCardForgetReaderW
SCardLocateCardsW
SCardControl
SCardListReadersW
SCardIntroduceReaderGroupW
SCardForgetReaderGroupW
SCardDisconnect
SCardAddReaderToGroupW
SCardEndTransaction
SCardBeginTransaction
SCardRemoveReaderFromGroupW
SCardReleaseStartedEvent
SCardIntroduceReaderW
SCardCancel
SCardConnectW
SCardLocateCardsA
SCardReleaseContext
Exports
Exports
Growother
Minute
WordForce
Sections
.text Size: 172KB - Virtual size: 168KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 360KB - Virtual size: 358KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 56KB - Virtual size: 665KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ