table_release
Static task
static1
Behavioral task
behavioral1
Sample
e8178aa730e044365fcc4665f1bc4ffcf682d25cbb4e268cbdfd1e02a59e3a7b.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e8178aa730e044365fcc4665f1bc4ffcf682d25cbb4e268cbdfd1e02a59e3a7b.dll
Resource
win10v2004-20240802-en
General
-
Target
1db3eebaabe0b4884a574c4f827b1ab0.zip
-
Size
1.3MB
-
MD5
c934e6f3887b4d0e03b8ca0c8ab55189
-
SHA1
77677b17016e9d3a03dc9b0d226d1cd05260b7a3
-
SHA256
0c75cc9cfb2d544f14da4a57a66a2e98a998ba66945c0bfdbed310a72b5b67df
-
SHA512
e3b37270bafeb8ea5deba2a819f60a306d7859a9761674b595935a2a1b11c685a278adfc4d11926d2ed16c2ced2a7b89408679d1a472990b3c7928e14ab60402
-
SSDEEP
24576:ttiVSAB7oJnJMNyKorC4IjhbNAYiqv7cydHst3K4hUh3e8V5ARZyQ9Cigl+tkfd:mSAhOnWNYC4IjZixqvdT4hae3UiAHd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/e8178aa730e044365fcc4665f1bc4ffcf682d25cbb4e268cbdfd1e02a59e3a7b
Files
-
1db3eebaabe0b4884a574c4f827b1ab0.zip.zip
Password: infected
-
e8178aa730e044365fcc4665f1bc4ffcf682d25cbb4e268cbdfd1e02a59e3a7b.dll windows:6 windows x86 arch:x86
Password: infected
47d186778bc9d198554e460e0d3becb7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CloseHandle
HeapAlloc
QueueUserAPC
LocalFree
GetFileSize
DeleteCriticalSection
VerSetConditionMask
GetProcessHeap
WideCharToMultiByte
SleepEx
VerifyVersionInfoW
TlsGetValue
TlsFree
FormatMessageA
CreateSemaphoreA
CreateEventA
CreateIoCompletionPort
WaitForSingleObjectEx
TerminateThread
DisableThreadLibraryCalls
SetEvent
CreateFileA
GetLastError
FormatMessageW
Sleep
MultiByteToWideChar
CreateEventW
PostQueuedCompletionStatus
GetModuleHandleA
DuplicateHandle
WaitForSingleObject
GetQueuedCompletionStatus
LeaveCriticalSection
SetEndOfFile
DeleteFileW
MoveFileExA
DeviceIoControl
RemoveDirectoryA
GetFileAttributesExA
GetFileAttributesA
CreateDirectoryA
ReadConsoleA
SetConsoleMode
LoadLibraryW
LoadLibraryA
ConvertThreadToFiber
ConvertFiberToThread
GetEnvironmentVariableW
FindFirstFileW
CreateFiber
DeleteFiber
QueryPerformanceCounter
QueryPerformanceFrequency
ResetEvent
WaitForMultipleObjectsEx
OpenEventA
GetCurrentProcessId
GetCurrentThreadId
ResumeThread
GetProcAddress
CreateWaitableTimerA
InitializeCriticalSection
LoadLibraryExA
GetSystemTime
SystemTimeToFileTime
RaiseException
InitializeCriticalSectionEx
InitializeCriticalSectionAndSpinCount
GetSystemTimeAsFileTime
GetModuleHandleW
EncodePointer
DecodePointer
LCMapStringEx
GetLocaleInfoEx
GetStringTypeW
GetCPInfo
InitializeSListHead
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
CreateThread
ExitThread
FreeLibraryAndExitThread
SetConsoleCtrlHandler
CreateFileW
GetDriveTypeW
GetFileInformationByHandle
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetModuleFileNameW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapReAlloc
GetStdHandle
FlushFileBuffers
WriteFile
GetConsoleOutputCP
GetConsoleMode
GetCurrentDirectoryW
GetFullPathNameW
SetStdHandle
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
GetTimeZoneInformation
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
HeapSize
WriteConsoleW
OutputDebugStringW
WaitForMultipleObjects
ReleaseSemaphore
SwitchToFiber
TlsAlloc
GetCurrentProcess
EnterCriticalSection
SetLastError
HeapFree
TlsSetValue
SetWaitableTimer
ReadFile
ws2_32
WSAGetLastError
socket
send
recv
WSACleanup
__WSAFDIsSet
accept
bind
WSAIoctl
closesocket
WSASend
select
setsockopt
ntohl
listen
WSASetLastError
WSAStringToAddressW
WSASocketW
WSAStartup
getsockname
connect
WSARecv
getsockopt
htonl
htons
ioctlsocket
gethostbyname
secur32
FreeContextBuffer
InitializeSecurityContextA
AcquireCredentialsHandleA
FreeCredentialsHandle
DeleteSecurityContext
advapi32
CryptGenRandom
CryptEnumProvidersW
CryptSignHashW
CryptDestroyHash
CryptCreateHash
CryptDecrypt
CryptExportKey
CryptGetUserKey
GetUserNameA
CryptGetProvParam
DeregisterEventSource
RegisterEventSourceW
ReportEventW
CryptAcquireContextW
CryptReleaseContext
CryptDestroyKey
CryptSetHashParam
CryptAcquireContextA
shell32
SHGetFolderPathA
crypt32
CertGetCertificateContextProperty
CertFreeCertificateContext
CertDuplicateCertificateContext
CertFindCertificateInStore
CertEnumCertificatesInStore
CertOpenStore
CertCloseStore
bcrypt
BCryptGenRandom
user32
GetUserObjectInformationW
MessageBoxW
GetProcessWindowStation
Exports
Exports
Sections
.text Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 635KB - Virtual size: 634KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 62KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 114KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 91KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ