Static task
static1
Behavioral task
behavioral1
Sample
5d230646d76c07255884b410707dffcb8fa4c5f7332bdc1279f05ee233601520.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5d230646d76c07255884b410707dffcb8fa4c5f7332bdc1279f05ee233601520.exe
Resource
win10v2004-20240802-en
General
-
Target
66f76ff625c80270c8b6598efd7eae4d.zip
-
Size
583KB
-
MD5
225f722cc2a4fd917001ee6ce9aacd21
-
SHA1
f42a9d2296c0e9dadad293d2be584511c8a3554a
-
SHA256
905b23740f727293d2a169a80085b4f1f6f0a9347596ce32809b531704a15058
-
SHA512
1a2771e469832d6e919cb842c587b1013554a4fdee4baec5eae4ac88ec4030b230bb4260303710c25e5f4c9e6518bf5baf5a95b3dc1365c5dde5a35ef06bc7a8
-
SSDEEP
12288:uEiqQDmOHLmfwFErR7e+KXJQ1oiSf9UXgbEkBYNCc5y1/GPq:uYQtr2HrR7e+8AoXMMSkrZGy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/5d230646d76c07255884b410707dffcb8fa4c5f7332bdc1279f05ee233601520
Files
-
66f76ff625c80270c8b6598efd7eae4d.zip.zip
Password: infected
-
5d230646d76c07255884b410707dffcb8fa4c5f7332bdc1279f05ee233601520.exe windows:5 windows x86 arch:x86
Password: infected
d859bbd1647ac3c1eef11ef6219c9ab3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegSetValueExW
RegCreateKeyExW
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegDeleteKeyW
RegQueryValueExW
CreateWellKnownSid
RegCloseKey
RegOpenKeyExW
oleacc
LresultFromObject
CreateStdAccessibleObject
kernel32
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
FormatMessageW
InterlockedIncrement
WriteFile
FlushFileBuffers
GetCurrentProcess
SetErrorMode
MoveFileA
GetSystemTimeAsFileTime
GlobalReAlloc
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
RaiseException
HeapSize
HeapReAlloc
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
QueryPerformanceCounter
GetCPInfo
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
CreateFileA
TlsGetValue
WritePrivateProfileStringW
GlobalFlags
DeleteCriticalSection
InitializeCriticalSection
GlobalFindAtomW
GetVersionExW
CompareStringW
GetVersionExA
GlobalFree
FreeResource
GlobalUnlock
MulDiv
GlobalAddAtomW
GetCurrentProcessId
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesW
GetModuleFileNameW
lstrcmpA
GetLocaleInfoW
CompareStringA
FindResourceW
LoadResource
LockResource
SizeofResource
InterlockedExchange
GlobalLock
lstrcmpW
GlobalAlloc
FreeLibrary
EnterCriticalSection
LeaveCriticalSection
WaitForDebugEvent
ContinueDebugEvent
GetStartupInfoW
TerminateProcess
CreateProcessW
LocalFree
CreateEventW
LocalAlloc
SetLastError
InterlockedDecrement
LocalFileTimeToFileTime
GetFileInformationByHandle
FileTimeToLocalFileTime
GetModuleHandleA
SetFileAttributesA
GetFileAttributesA
SetFileTime
DosDateTimeToFileTime
FileTimeToDosDateTime
LoadLibraryW
lstrcpyA
SetFileAttributesW
lstrcpyW
GetTempPathA
DeleteFileW
CloseHandle
lstrcatW
lstrcmpiW
LoadLibraryA
GetProcAddress
GetLastError
lstrlenW
MultiByteToWideChar
GetACP
lstrcatA
Sleep
WideCharToMultiByte
GetProcessHeap
GetTickCount
GetModuleHandleW
WaitForSingleObject
HeapFree
HeapAlloc
lstrlenA
SetFilePointer
ExitProcess
VirtualAlloc
VirtualFree
UnhandledExceptionFilter
VirtualQuery
gdi32
GetDeviceCaps
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
GetObjectW
DeleteObject
GetClipBox
SetMapMode
GetStockObject
rpcrt4
NdrAsyncClientCall
RpcAsyncInitializeHandle
RpcStringFreeW
RpcBindingFree
RpcBindingSetAuthInfoExW
RpcAsyncCompleteCall
RpcRaiseException
RpcStringBindingComposeW
RpcBindingFromStringBindingW
oleaut32
VariantChangeType
VariantInit
VariantClear
shlwapi
PathFindFileNameW
PathFindExtensionW
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
user32
DestroyMenu
UnregisterClassW
LoadCursorW
GetSysColorBrush
RegisterWindowMessageW
SendDlgItemMessageA
WinHelpW
GetCapture
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
UpdateWindow
GetSubMenu
GetMenuItemID
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
PtInRect
DefWindowProcW
GetMenu
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
CopyRect
UnhookWindowsHookEx
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
GetNextDlgTabItem
EndDialog
GetSysColor
EndPaint
BeginPaint
ReleaseDC
GetDC
ClientToScreen
GrayStringW
DrawTextExW
EnableWindow
SendMessageW
GetSystemMetrics
LoadIconW
DrawTextW
TabbedTextOutW
GetWindowTextW
SetWindowPos
SetFocus
ShowWindow
SetWindowLongW
GetDlgCtrlID
GetMenuItemCount
GetClientRect
DrawIcon
IsIconic
CheckMenuItem
EnableMenuItem
GetMenuState
ModifyMenuW
GetParent
GetFocus
LoadBitmapW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
PostQuitMessage
PostMessageW
SetCursor
MessageBoxW
IsWindowEnabled
GetLastActivePopup
GetWindowLongW
GetWindowThreadProcessId
ValidateRect
IsWindow
SetWindowTextW
IsDialogMessageW
SendDlgItemMessageW
GetDlgItem
GetWindow
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageW
GetCursorPos
CallWindowProcW
Sections
.text Size: 282KB - Virtual size: 282KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 441KB - Virtual size: 457KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ