Static task
static1
Behavioral task
behavioral1
Sample
c63d21e659c738bf6f39b8608045c69f6a516e40155be20d2c5c3e766e6f90f8.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c63d21e659c738bf6f39b8608045c69f6a516e40155be20d2c5c3e766e6f90f8.dll
Resource
win10v2004-20240802-en
General
-
Target
219c963c3c2800f3955876bbc202a6a7.zip
-
Size
13KB
-
MD5
d813a15ead500c2ab060f4153463f601
-
SHA1
c5dce326f9f2e02902ad3b5a285e59cbc12901f7
-
SHA256
1018f17ff4863ca1238a722cd6e0d5a651790a742a36efdb278a7b6d38a85599
-
SHA512
0da4fa224adfc17743d99e8c062261abdb6d650eeb8b5b733ac1f339805066c67266f6a6b9eb8d81f97e163e77c97469c96023f3dbf5c0e8f727f0bad51b0532
-
SSDEEP
192:sXnxZGSD0x4rUrBLzt3zAI1R1thcmbs9o/wqxT6siiiA6e/86BjpJELhN6lnxsXB:sXjrDVU1pLhcmionc+Se/Z8NUxCB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/c63d21e659c738bf6f39b8608045c69f6a516e40155be20d2c5c3e766e6f90f8
Files
-
219c963c3c2800f3955876bbc202a6a7.zip.zip
Password: infected
-
c63d21e659c738bf6f39b8608045c69f6a516e40155be20d2c5c3e766e6f90f8.dll windows:5 windows x86 arch:x86
Password: infected
a94230855efb6426cfe70b8b695e0efd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
SuspendThread
GetSystemTimeAsFileTime
DuplicateHandle
CreateToolhelp32Snapshot
GetThreadPriority
OpenThread
Thread32Next
Thread32First
CreateThread
ReleaseMutex
CreateMutexA
GetModuleHandleA
GetProcAddress
WaitForSingleObject
GetCurrentProcess
CloseHandle
OutputDebugStringA
QueryFullProcessImageNameA
OpenProcess
GetCurrentThreadId
GetTickCount
Sleep
GetCurrentProcessId
InterlockedCompareExchange
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
InterlockedExchange
user32
GetDC
gdi32
DeleteDC
BitBlt
GetDeviceCaps
GetDIBits
CreateDCA
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
GetObjectA
DeleteObject
advapi32
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
shell32
ShellExecuteA
iphlpapi
GetExtendedTcpTable
msvcr90
atoi
realloc
_encode_pointer
_malloc_crt
_encoded_null
_decode_pointer
_initterm
_initterm_e
_amsg_exit
_adjust_fdiv
__CppXcptFilter
_crt_debugger_hook
__clean_type_info_names_internal
_unlock
__dllonexit
_lock
_onexit
_except_handler4_common
printf
strstr
malloc
free
strncmp
sprintf
strrchr
memset
ws2_32
setsockopt
htons
WSAGetLastError
select
WSASend
inet_addr
connect
WSAEnumProtocolsA
recv
WSAResetEvent
WSASocketA
WSAWaitForMultipleEvents
WSAStartup
WSACleanup
inet_ntoa
ntohs
WSAGetOverlappedResult
WSACreateEvent
WSASetLastError
WSACloseEvent
closesocket
Sections
.text Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ