Static task
static1
Behavioral task
behavioral1
Sample
02530d7b104f2bca51e1a37c2388877e75da1b58cd41094e0a0a0079f545dc3f.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
02530d7b104f2bca51e1a37c2388877e75da1b58cd41094e0a0a0079f545dc3f.exe
Resource
win10v2004-20240802-en
General
-
Target
c1a5bfe36090db954261d359ac546ecc.zip
-
Size
14KB
-
MD5
715ba580ed1ed21672b644830ae8533e
-
SHA1
74a5b206e7028c9ecb9e08e45ef55553903dee39
-
SHA256
9fa6a8690921d3a48c7a35b7198c5c61ab509124554c0399f893e32c6e383be0
-
SHA512
2e7d92f8051b51e0aadae92882f6d55424f5490ccb7fe11c00bd51f6690db97038796532c49652e7a46c6c82b2f2243657b57e0553a8c637d965436dccb85d70
-
SSDEEP
192:ETXvtV9J4cajyegLT6NpATgnUkfqCW+40e+xiYiE/trTXuE1Q+EMUCCsAPQ1VO1e:ETXzkHMmzUkCz+40f9iYtrqE1d9vK1e
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/02530d7b104f2bca51e1a37c2388877e75da1b58cd41094e0a0a0079f545dc3f
Files
-
c1a5bfe36090db954261d359ac546ecc.zip.zip
Password: infected
-
02530d7b104f2bca51e1a37c2388877e75da1b58cd41094e0a0a0079f545dc3f.exe windows:4 windows x86 arch:x86
Password: infected
2e54ed1a27c193629ab1d4ee166013df
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CopyFileA
GetFileAttributesA
GetSystemInfo
GetLocalTime
GetStartupInfoA
GetModuleHandleA
GetLastError
WaitForSingleObject
OpenProcess
CreateFileA
DuplicateHandle
MultiByteToWideChar
GetTempPathA
WinExec
OpenMutexA
ReleaseMutex
ExitProcess
lstrlenA
FreeLibrary
GetModuleFileNameA
GetShortPathNameA
GetEnvironmentVariableA
SetPriorityClass
GetCurrentProcess
GetCurrentThread
SetThreadPriority
LoadLibraryA
GetProcAddress
CreateThread
CloseHandle
lstrcpyA
HeapFree
OutputDebugStringA
ExitThread
Sleep
GetTickCount
lstrcatA
GetProcessHeap
HeapAlloc
GetSystemDefaultUILanguage
user32
wsprintfA
advapi32
StartServiceCtrlDispatcherA
OpenSCManagerA
CreateServiceA
LockServiceDatabase
ChangeServiceConfig2A
UnlockServiceDatabase
StartServiceA
RegOpenKeyA
RegisterServiceCtrlHandlerA
SetServiceStatus
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenServiceA
DeleteService
CloseServiceHandle
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegQueryValueExA
RegEnumKeyExA
RegEnumValueA
RegOpenKeyExA
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegSetKeySecurity
RegCloseKey
FreeSid
shell32
SHChangeNotify
ShellExecuteExA
msvcrt
srand
time
printf
_ftol
sprintf
fprintf
_iob
realloc
malloc
__CxxFrameHandler
strstr
atoi
strncpy
strcspn
wcscpy
memcpy
??3@YAXPAX@Z
??2@YAPAXI@Z
free
__dllonexit
_onexit
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
rand
strlen
memset
strcpy
strchr
strncat
strcat
_except_handler3
_CxxThrowException
_strnicmp
ws2_32
WSAGetLastError
WSACleanup
setsockopt
sendto
select
send
inet_addr
gethostbyname
socket
htons
connect
closesocket
__WSAFDIsSet
recv
WSAIoctl
WSAStartup
WSASocketA
htonl
shlwapi
SHDeleteKeyA
netapi32
NetUserAdd
NetLocalGroupAddMembers
msvcp60
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$allocator@D@1@@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??A?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAADI@Z
??0Init@ios_base@std@@QAE@XZ
pdh
PdhOpenQueryA
PdhAddCounterA
PdhCollectQueryData
PdhGetFormattedCounterValue
PdhCloseQuery
PdhEnumObjectItemsA
iphlpapi
GetIfTable
Sections
.text Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 896B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ