Static task
static1
Behavioral task
behavioral1
Sample
89f75c58abfc2ce7972ea44e3e2448c49b7f6b09df5bd42a807dab559958c5a0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
89f75c58abfc2ce7972ea44e3e2448c49b7f6b09df5bd42a807dab559958c5a0.exe
Resource
win10v2004-20240802-en
General
-
Target
898e6ecb72298733403df86cb3f4a30f.zip
-
Size
393KB
-
MD5
3e330cfb2c50c3e835b5c08e1008c3d8
-
SHA1
41cdaaefaa099091bbf1e04e0340094130a555b4
-
SHA256
61b7030d4881ff2aaa8005161847e434c4730eeff19861157c449cae503dfc66
-
SHA512
e39dd80e09cb1f03d7f770c2e64c36c102a008c939c1b878ffbf2ac627707155fe522b2954bc0f72626cfb984705a8a97e1b9ce2ad07be8693d6ea674b973daa
-
SSDEEP
6144:oxkGwR16658L0kLcgKDQxBNbOZFzhgQqjH3BQXGNzC6PDrt2cdD7Lb26ETcPR:q9TeaL1C5hJqLxC6rRhwo5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/89f75c58abfc2ce7972ea44e3e2448c49b7f6b09df5bd42a807dab559958c5a0
Files
-
898e6ecb72298733403df86cb3f4a30f.zip.zip
Password: infected
-
89f75c58abfc2ce7972ea44e3e2448c49b7f6b09df5bd42a807dab559958c5a0.exe windows:5 windows x86 arch:x86
Password: infected
4eb58b618ac563b5b867f5effed6679d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_AGGRESIVE_WS_TRIM
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_exit
_XcptFilter
_except_handler3
__p__commode
_controlfp
__set_app_type
__p__fmode
memset
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
msimg32
TransparentBlt
comctl32
InitCommonControlsEx
version
VerQueryValueW
kernel32
GlobalFlags
GlobalFree
GlobalGetAtomNameW
GlobalHandle
GlobalLock
GlobalReAlloc
GlobalSize
GlobalUnlock
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
IsProcessorFeaturePresent
IsValidCodePage
LCMapStringW
LeaveCriticalSection
LoadLibraryA
LoadLibraryExW
LoadLibraryW
LoadResource
LocalAlloc
LocalFree
LocalReAlloc
LockFile
GlobalFindAtomW
lstrcmpA
lstrcmpiW
lstrcmpW
lstrcpynW
lstrcpyW
MoveFileA
MoveFileW
MulDiv
MultiByteToWideChar
OutputDebugStringA
OutputDebugStringW
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
ReadConsoleW
ReadFile
ResumeThread
SearchPathW
SetEndOfFile
SetEnvironmentVariableA
SetEnvironmentVariableW
SetErrorMode
SetFileAttributesA
SetFileAttributesW
SetLastError
SetStdHandle
SetThreadPriority
SetUnhandledExceptionFilter
SizeofResource
Sleep
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnlockFile
UnmapViewOfFile
VirtualAlloc
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WinExec
WriteConsoleW
WriteFile
WritePrivateProfileStringW
GetStartupInfoA
GlobalDeleteAtom
GlobalAlloc
GlobalAddAtomW
GetWindowsDirectoryW
GetVolumeInformationW
GetTimeZoneInformation
GetTickCount
GetTempPathW
GetTempFileNameW
GetSystemTimeAsFileTime
GetSystemInfo
GetSystemDirectoryW
GetStringTypeW
GetStdHandle
GetStartupInfoW
GetProfileIntW
GetProcessHeap
GetProcAddress
GetPrivateProfileStringW
GetPrivateProfileIntW
GetOEMCP
GetNumberFormatW
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
GetLocalTime
GetLocaleInfoW
GetLastError
GetFullPathNameW
GetFullPathNameA
GetFileType
GetFileTime
GetFileInformationByHandle
GetFileAttributesW
GetFileAttributesExW
GetFileAttributesA
GetEnvironmentStringsW
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentDirectoryW
GetCurrentDirectoryA
GetCPInfo
GetConsoleMode
GetConsoleCP
GetComputerNameW
GetCommandLineW
GetCommandLineA
GetACP
FreeResource
FreeEnvironmentStringsW
FormatMessageW
FormatMessageA
FlushFileBuffers
FindResourceW
FindResourceExW
FindNextFileW
FindFirstFileW
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FileTimeToDosDateTime
ExitThread
EnterCriticalSection
DuplicateHandle
DeleteFileW
DeleteFileA
DeleteCriticalSection
CreateThread
CreateProcessW
CreateFileW
CreateFileA
CreateEventW
CreateDirectoryW
CreateDirectoryA
ExitProcess
LockResource
user32
InvertRect
IsCharLowerW
IsChild
IsClipboardFormatAvailable
IsDialogMessageW
IsIconic
IsMenu
IsRectEmpty
IsWindowEnabled
IsWindowVisible
IsZoomed
KillTimer
LoadAcceleratorsW
LoadBitmapW
LoadCursorW
LoadIconW
LoadImageW
LoadMenuW
LockWindowUpdate
MapDialogRect
MapVirtualKeyExW
MapVirtualKeyW
MapWindowPoints
MessageBeep
MessageBoxW
ModifyMenuW
MoveWindow
OffsetRect
OpenClipboard
PeekMessageW
PostMessageW
PostQuitMessage
PostThreadMessageW
PtInRect
RedrawWindow
RegisterClassW
RegisterClipboardFormatW
RegisterWindowMessageW
ReleaseCapture
ReleaseDC
RemoveMenu
RemovePropW
ScreenToClient
ScrollWindow
SendDlgItemMessageA
SendMessageW
SetActiveWindow
SetCapture
SetClassLongW
SetClipboardData
SetCursor
SetCursorPos
SetFocus
SetForegroundWindow
SetMenuDefaultItem
SetMenuItemBitmaps
SetMenuItemInfoW
SetParent
SetPropW
SetRectEmpty
SetScrollInfo
SetScrollPos
SetScrollRange
SetTimer
SetWindowLongW
SetWindowPlacement
SetWindowPos
SetWindowRgn
SetWindowsHookExW
SetWindowTextW
ShowOwnedPopups
ShowScrollBar
ShowWindow
SubtractRect
SystemParametersInfoW
TabbedTextOutW
ToUnicodeEx
TrackPopupMenu
TranslateAcceleratorW
TranslateMDISysAccel
TranslateMessage
UnhookWindowsHookEx
UnionRect
UnregisterClassW
UpdateWindow
ValidateRect
WaitMessage
WinHelpW
wsprintfW
MessageBoxA
InsertMenuItemW
InflateRect
HideCaret
GrayStringW
GetWindowThreadProcessId
InvalidateRect
GetWindowTextLengthW
GetWindowRgn
GetWindowRect
GetWindowPlacement
GetWindowLongW
GetWindowDC
GetUpdateRect
GetTopWindow
GetSystemMetrics
GetSystemMenu
GetSysColorBrush
GetSubMenu
GetScrollRange
GetScrollPos
GetScrollInfo
GetPropW
GetParent
GetNextDlgTabItem
GetNextDlgGroupItem
GetMessageW
GetMessageTime
GetMessagePos
GetMenuStringW
GetMenuState
GetMenuItemInfoW
GetMenuItemID
GetMenuItemCount
GetMenuDefaultItem
GetMenuCheckMarkDimensions
GetLastActivePopup
GetKeyNameTextW
GetKeyboardState
GetKeyboardLayout
GetIconInfo
GetFocus
GetDoubleClickTime
GetDlgItem
GetDlgCtrlID
GetDesktopWindow
GetDC
GetCursorPos
GetClientRect
GetClassNameW
UnpackDDElParam
ReuseDDElParam
GetClassLongW
GetClassInfoExW
GetCapture
GetAsyncKeyState
GetActiveWindow
FrameRect
FillRect
EqualRect
EndDialog
EnableWindow
EnableScrollBar
EnableMenuItem
EmptyClipboard
DrawTextW
DrawTextExW
DrawStateW
DrawMenuBar
DrawIconEx
DrawFrameControl
DrawFocusRect
DrawEdge
DispatchMessageW
DestroyWindow
DestroyMenu
DestroyIcon
DestroyCursor
DestroyAcceleratorTable
DeleteMenu
DefWindowProcW
DefMDIChildProcW
DefFrameProcW
CreateWindowExW
CreatePopupMenu
CreateMenu
CreateDialogIndirectParamW
CreateAcceleratorTableW
CopyRect
CopyImage
CopyIcon
CopyAcceleratorTableW
CloseClipboard
ClientToScreen
CheckMenuItem
CheckDlgButton
CharUpperW
CharUpperBuffW
CallWindowProcW
CallNextHookEx
BringWindowToTop
GetClassInfoW
GetKeyState
IntersectRect
GetWindowTextW
InsertMenuW
GetForegroundWindow
gdi32
EnumFontFamiliesW
Ellipse
ExcludeClipRect
ExtFloodFill
ExtSelectClipRgn
Escape
EnumFontFamiliesExW
DPtoLP
ExtTextOutW
FillRgn
GetCurrentObject
GetDeviceCaps
GetNearestPaletteIndex
GetObjectType
GetObjectW
GetPaletteEntries
GetPixel
GetRgnBox
GetStockObject
GetSystemPaletteEntries
GetTextCharsetInfo
GetTextColor
GetTextExtentPoint32W
GetBoundsRect
GetTextFaceW
GetTextMetricsW
GetViewportExtEx
GetViewportOrgEx
GetWindowExtEx
GetWindowOrgEx
IntersectClipRect
LineTo
LPtoDP
MoveToEx
OffsetRgn
DeleteObject
OffsetWindowOrgEx
PatBlt
Polyline
PtInRegion
PtVisible
RealizePalette
Rectangle
RectVisible
RestoreDC
RoundRect
SaveDC
ScaleViewportExtEx
ScaleWindowExtEx
SelectObject
SelectPalette
SetBkColor
SetBkMode
SetDIBColorTable
SetMapMode
SetPaletteEntries
SetPixel
SetPixelV
SetPolyFillMode
SetRectRgn
SetROP2
SetTextAlign
SetTextColor
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
SetWindowOrgEx
StretchBlt
TextOutW
TranslateCharsetInfo
GetBkColor
FrameRgn
DeleteDC
CreateSolidBrush
CreateRoundRectRgn
CreateRectRgnIndirect
CreatePolygonRgn
CreatePen
CreatePatternBrush
CreatePalette
CreateHatchBrush
CreateFontIndirectW
CreateEllipticRgn
OffsetViewportOrgEx
CreateDIBSection
GetClipBox
winspool.drv
OpenPrinterW
advapi32
RegQueryValueW
RegQueryValueExW
RegQueryValueExA
RegQueryInfoKeyW
RegOpenKeyExW
RegOpenKeyExA
RegEnumValueW
RegEnumKeyW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegSetValueExW
shell32
SHGetFileInfoW
ShellExecuteExW
ShellExecuteW
ole32
OleDestroyMenuDescriptor
OleDuplicateData
OleGetClipboard
OleLockRunning
OleCreateMenuDescriptor
RegisterDragDrop
ReleaseStgMedium
RevokeDragDrop
DoDragDrop
IsAccelerator
CreateStreamOnHGlobal
CoUninitialize
CoTaskMemFree
OleTranslateAccelerator
CoTaskMemAlloc
oleaut32
GetErrorInfo
shlwapi
PathRemoveFileSpecW
PathStripToRootW
Sections
.text Size: 428KB - Virtual size: 424KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 4KB - Virtual size: 672B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ifx Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 384KB - Virtual size: 380KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ