Static task
static1
Behavioral task
behavioral1
Sample
277d8d12ef908f967b0fcdde48276e22003009693ac6885e30a3d478efbb4870.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
277d8d12ef908f967b0fcdde48276e22003009693ac6885e30a3d478efbb4870.exe
Resource
win10v2004-20240802-en
General
-
Target
89905bc95cc859e7cf70f3567359b46c.zip
-
Size
1.8MB
-
MD5
1769a92b9dfbe11ab1bf496ececbb904
-
SHA1
2c7677f4a2eb81be1e73cac7525e08e4495f0719
-
SHA256
ff736fc8c12f9d74f6677316e084705f9f54f1834ce93af6935d5fedd4332d1f
-
SHA512
3713e197075a6ceb217091d81a3c9396cf1a1252012993e639fe5ef1c5f1a5f4ed53073d37b112aa88d5d491b2593f7b2e7832cb1fd8e5bff39b997183e586f7
-
SSDEEP
49152:bxd4VjCXa4p5HG0aJ7P1xRxeiMWemmOUdKfFtjHSG8:b8Vwab0aJhxWZWeLONPU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/277d8d12ef908f967b0fcdde48276e22003009693ac6885e30a3d478efbb4870
Files
-
89905bc95cc859e7cf70f3567359b46c.zip.zip
Password: infected
-
277d8d12ef908f967b0fcdde48276e22003009693ac6885e30a3d478efbb4870.exe windows:6 windows x64 arch:x64
Password: infected
97d426c748e57e5115e889ca0ae4a9de
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ws2_32
htons
getsockopt
getsockname
getpeername
connect
bind
WSASetLastError
select
__WSAFDIsSet
inet_pton
shutdown
WSAGetLastError
getnameinfo
gethostname
sendto
recvfrom
ntohl
freeaddrinfo
getaddrinfo
ioctlsocket
listen
htonl
socket
send
recv
closesocket
accept
WSACleanup
WSAStartup
WSAIoctl
setsockopt
ntohs
wldap32
ord46
ord211
ord60
ord45
ord50
ord41
ord22
ord26
ord200
ord27
ord32
ord33
ord301
ord143
ord30
ord79
ord35
crypt32
CertCloseStore
CertOpenStore
CertEnumCertificatesInStore
CertGetCertificateContextProperty
CertDuplicateCertificateContext
CertFreeCertificateChain
CertGetCertificateChain
CertFreeCertificateChainEngine
CertCreateCertificateChainEngine
CryptQueryObject
CertGetNameStringA
CertAddCertificateContextToStore
CryptStringToBinaryA
CertFreeCertificateContext
CertFindCertificateInStore
advapi32
CopySid
GetLengthSid
ConvertSidToStringSidW
CryptEnumProvidersW
CryptSignHashW
CryptDecrypt
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptDestroyKey
CryptAcquireContextW
ReportEventW
RegisterEventSourceW
DeregisterEventSource
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGenRandom
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextA
OpenProcessToken
IsValidSid
GetTokenInformation
d3d11
D3D11CreateDeviceAndSwapChain
kernel32
CreateProcessW
CreateFileW
GetDriveTypeW
GetFileInformationByHandle
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
SetFilePointerEx
SetConsoleCtrlHandler
GetModuleFileNameW
GetCommandLineA
GetCommandLineW
GetConsoleOutputCP
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetTimeZoneInformation
DeleteFileW
WaitForSingleObject
GetExitCodeProcess
GetFileAttributesExW
GetCurrentDirectoryW
GetFullPathNameW
SetStdHandle
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetEndOfFile
VirtualAlloc
GetSystemInfo
MultiByteToWideChar
GlobalAlloc
GlobalFree
GlobalLock
WideCharToMultiByte
GlobalUnlock
GetModuleHandleA
LoadLibraryA
QueryPerformanceFrequency
GetProcAddress
VerSetConditionMask
FreeLibrary
QueryPerformanceCounter
HeapFree
SetLastError
SetConsoleTitleA
GetCurrentProcess
OutputDebugStringA
InitializeCriticalSectionEx
HeapSize
WriteConsoleW
GetLastError
HeapReAlloc
CloseHandle
RaiseException
LoadLibraryW
HeapAlloc
DecodePointer
HeapDestroy
Beep
LocalFree
DeleteCriticalSection
GetProcessHeap
GetModuleHandleW
GetConsoleWindow
SleepEx
IsDebuggerPresent
CheckRemoteDebuggerPresent
FormatMessageA
EnterCriticalSection
LeaveCriticalSection
GetSystemDirectoryA
VerifyVersionInfoA
WaitForSingleObjectEx
ExpandEnvironmentStringsA
GetStdHandle
GetFileType
ReadFile
PeekNamedPipe
WaitForMultipleObjects
CreateFileA
GetFileSizeEx
GetEnvironmentVariableW
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
FormatMessageW
WriteFile
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlVirtualUnwind
SwitchToFiber
DeleteFiber
CreateFiber
ConvertFiberToThread
ConvertThreadToFiber
FindClose
FindFirstFileW
FindNextFileW
GetSystemTime
SystemTimeToFileTime
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
LCMapStringEx
EncodePointer
InitOnceBeginInitialize
InitOnceComplete
GetStartupInfoW
InitializeSListHead
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
LoadLibraryExW
VirtualProtect
VirtualQuery
ExitProcess
CreateThread
UnhandledExceptionFilter
RtlLookupFunctionEntry
ExitThread
GetTickCount
FreeLibraryAndExitThread
Sleep
RtlUnwind
RtlPcToFileHeader
InterlockedPushEntrySList
RtlUnwindEx
OutputDebugStringW
GetCPInfo
GetStringTypeW
RtlCaptureContext
CreateEventW
ResetEvent
SetEvent
user32
GetProcessWindowStation
DefWindowProcW
GetKeyState
DestroyWindow
CreateWindowExW
SendMessageW
UnregisterClassW
GetUserObjectInformationW
ShowWindow
DispatchMessageW
PeekMessageW
MessageBoxA
TranslateMessage
FindWindowW
PostQuitMessage
FindWindowA
RegisterClassExW
ScreenToClient
GetCapture
ClientToScreen
IsChild
TrackMouseEvent
GetForegroundWindow
LoadCursorW
SetCapture
SetCursor
GetClientRect
ReleaseCapture
SetCursorPos
GetCursorPos
OpenClipboard
CloseClipboard
EmptyClipboard
GetClipboardData
SetClipboardData
MessageBoxW
UpdateWindow
shell32
ShellExecuteA
imm32
ImmSetCompositionWindow
ImmReleaseContext
ImmGetContext
d3dcompiler_47
D3DCompile
bcrypt
BCryptGenRandom
userenv
UnloadUserProfile
rpcrt4
RpcStringFreeA
UuidToStringA
UuidCreate
Sections
.text Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 824KB - Virtual size: 824KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ