powershell.pdb
Static task
static1
Behavioral task
behavioral1
Sample
58dd33be0c419b2b0db1c8123a6fbd953129b316a43d5c40498d26d6eecf2e11.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
58dd33be0c419b2b0db1c8123a6fbd953129b316a43d5c40498d26d6eecf2e11.exe
Resource
win10v2004-20240802-en
General
-
Target
321f1499c9fb94f98e3dcab7ac4dd07f.zip
-
Size
239KB
-
MD5
8775c372af89e3396a8674c58dabc16b
-
SHA1
a848851d969e4508b972dca0c612aad32a314eea
-
SHA256
90b9adda88d9e3d5c53df4e85a50801452485b406261e367cd5f7085b542e2a3
-
SHA512
e84405fb883c88fd286dd6c4a0e56297ba6207ccbf5889fe2633635d45e5d9094fc18cee24876e4091d9ee92f55f3a96af03be2f198430f9f36144cb74f6cec8
-
SSDEEP
6144:4uhJjrhXmQK/Ng6vHAHtgtr1VQeOCvPACzdp1YGARXUkDG:t/rhBK/a6IcbRRp1PARXvG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/58dd33be0c419b2b0db1c8123a6fbd953129b316a43d5c40498d26d6eecf2e11
Files
-
321f1499c9fb94f98e3dcab7ac4dd07f.zip.zip
Password: infected
-
58dd33be0c419b2b0db1c8123a6fbd953129b316a43d5c40498d26d6eecf2e11.exe windows:6 windows x86 arch:x86
Password: infected
96ba691b035d05f44e35ab23f6ba946c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
RegQueryValueExW
kernel32
InterlockedDecrement
GetCurrentProcess
GetModuleHandleW
SetThreadUILanguage
WriteFile
FormatMessageW
WriteConsoleW
CreateFileW
CompareStringW
GetStartupInfoW
GetStdHandle
GetLastError
FindClose
IsWow64Process
GetFileType
CloseHandle
LocalFree
ExpandEnvironmentStringsW
GetSystemDefaultUILanguage
UnmapViewOfFile
SetErrorMode
GetLocaleInfoW
GetVersionExW
CreateFileMappingW
MapViewOfFile
LoadLibraryExW
SetLastError
LoadResource
FindResourceExW
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
RtlUnwind
InterlockedCompareExchange
Sleep
InterlockedExchange
SearchPathW
FindFirstFileW
FreeLibrary
GetUserDefaultUILanguage
msvcrt
__setusermatherr
_initterm
_wcsicmp
_wcsnicmp
wcsncmp
_vsnwprintf
exit
_XcptFilter
__p__commode
_controlfp
?terminate@@YAXXZ
??1type_info@@UAE@XZ
memcpy
_amsg_exit
__set_app_type
__p__fmode
_exit
_cexit
__wgetmainargs
_CxxThrowException
memset
__CxxFrameHandler
??2@YAPAXI@Z
_itow
??3@YAXPAX@Z
??_V@YAXPAX@Z
wcsrchr
malloc
free
wcstoul
??_U@YAPAXI@Z
wcschr
bsearch
atl
ord30
ole32
PropVariantClear
CoInitialize
CoUninitialize
CoCreateInstance
CoInitializeEx
oleaut32
SysAllocString
VariantClear
SafeArrayDestroy
SafeArrayCreate
SysFreeString
SafeArrayPutElement
SysStringLen
mscoree
CorBindToRuntimeEx
shlwapi
SHStrDupW
user32
LoadStringW
Sections
.text Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 400KB - Virtual size: 400KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 30KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE