64BitMAPIBroker.pdb
Static task
static1
Behavioral task
behavioral1
Sample
dfd8fa6a1e00f2f389bb90ffedb9feef4f05c9042ea70e774fb6b8fd3ea22a6c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dfd8fa6a1e00f2f389bb90ffedb9feef4f05c9042ea70e774fb6b8fd3ea22a6c.exe
Resource
win10v2004-20240802-en
General
-
Target
e55bcaf02c06fa599929f16d4335bc8d.zip
-
Size
910KB
-
MD5
2ae661703f1ffa047cff5fee0b90896c
-
SHA1
a5a2306585814c527daa60a3c7b53383d37ccab7
-
SHA256
03a7d90aac7dda92f50f28ebb8be0769b301c21ec64926bf31ffd68b244af5a6
-
SHA512
f0c75c70ed32303d5498fc356cb9153a15ca87c6ce432b6af7d4f1bc32e368981cc2216a92856c67087c197338d8292937db32083b013cf7531f319984ce7d07
-
SSDEEP
24576:bQb4+KNsKWKlpmwpq//4O8Nl9WXTIxZ3NwGv12/BccnZIg:MMTsXKk//4RWXcxpN7vQ/ucT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/dfd8fa6a1e00f2f389bb90ffedb9feef4f05c9042ea70e774fb6b8fd3ea22a6c
Files
-
e55bcaf02c06fa599929f16d4335bc8d.zip.zip
Password: infected
-
dfd8fa6a1e00f2f389bb90ffedb9feef4f05c9042ea70e774fb6b8fd3ea22a6c.exe windows:5 windows x64 arch:x64
Password: infected
4476a387919a0e264ba6d7a29b130d38
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
WriteFile
InitializeCriticalSection
CreateEventA
LeaveCriticalSection
TransactNamedPipe
ReadFile
CreateFileW
DisconnectNamedPipe
GetLastError
SetLastError
GetProcAddress
EnterCriticalSection
ResetEvent
GetFileType
SetNamedPipeHandleState
DeleteCriticalSection
CloseHandle
GetCurrentProcessId
WaitNamedPipeW
CreateThread
GetVersionExA
PeekNamedPipe
OpenProcess
GetOverlappedResult
FlushFileBuffers
CreateNamedPipeA
WaitForMultipleObjects
GetCommandLineA
Sleep
FreeLibrary
WideCharToMultiByte
LoadLibraryA
CreateNamedPipeW
GetModuleHandleW
GetSystemTimeAsFileTime
GetCurrentThreadId
ConnectNamedPipe
SetEvent
WaitForSingleObject
GetCurrentProcess
LocalFree
GetTickCount
QueryPerformanceCounter
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
DecodePointer
EncodePointer
GetCurrentThread
LocalAlloc
TlsSetValue
CreateSemaphoreA
TlsAlloc
TlsGetValue
CreateMutexW
TlsFree
MultiByteToWideChar
user32
TranslateMessage
DispatchMessageA
GetMessageA
advapi32
ConvertSidToStringSidA
GetTokenInformation
OpenProcessToken
OpenThreadToken
ConvertStringSecurityDescriptorToSecurityDescriptorA
shell32
SHGetFileInfoW
msvcp100
?_Xout_of_range@std@@YAXPEBD@Z
?_Swap_all@_Container_base0@std@@QEAAXAEAU12@@Z
?_Xlength_error@std@@YAXPEBD@Z
msvcr100
memcpy
memcmp
memchr
memset
_vsnwprintf_s
swscanf_s
__C_specific_handler
_unlock
__dllonexit
_lock
_onexit
_amsg_exit
__wgetmainargs
_XcptFilter
_exit
_cexit
exit
_wcmdln
_initterm
_initterm_e
_configthreadlocale
_CxxThrowException
_commode
_fmode
__set_app_type
__crt_debugger_hook
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QEAAXXZ
_wsplitpath_s
vwprintf_s
malloc
free
wcscpy_s
??_V@YAXPEAX@Z
??2@YAPEAX_K@Z
memcpy_s
??3@YAXPEAX@Z
_wassert
memmove
??0exception@std@@QEAA@AEBV01@@Z
??0exception@std@@QEAA@AEBQEBD@Z
??1exception@std@@UEAA@XZ
?what@exception@std@@UEBAPEBDXZ
__CxxFrameHandler3
wcscat_s
wcstok_s
_set_invalid_parameter_handler
__setusermatherr
strtok_s
_purecall
Sections
.text Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 584B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ