Static task
static1
Behavioral task
behavioral1
Sample
a1c59b89c79d51496bca3bb67723db963900699f5db3b9e4f09fae181c9a9120.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a1c59b89c79d51496bca3bb67723db963900699f5db3b9e4f09fae181c9a9120.exe
Resource
win10v2004-20240802-en
General
-
Target
6086861f5fdb06e45f5d374af5be13d6.zip
-
Size
3.4MB
-
MD5
68dc6beb395076c02426b7aadcbbcc75
-
SHA1
f8d20cf6d6272b9ee4cddebe173b3a1c300b961c
-
SHA256
290983c314ffe132bf31523c995b6c7b2ebf450ed6b9d3f8b588cc1d1e01ea24
-
SHA512
f0ef27f24ae4567fda0e9414b461b2e7926156cc78043a31158d49c66bd3d703b1e7b052ce6a734269c30b6fd390bad6681d04d2dd1d7bf16fa9056bb27917d7
-
SSDEEP
49152:9bopbrWHyGon+34fFPUhl7LVOBorY6+85j/27H0XeE2mGmvSVimJ0BN654g:9KbckJt8RROBorY675rklmSimWN6Gg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/a1c59b89c79d51496bca3bb67723db963900699f5db3b9e4f09fae181c9a9120
Files
-
6086861f5fdb06e45f5d374af5be13d6.zip.zip
Password: infected
-
a1c59b89c79d51496bca3bb67723db963900699f5db3b9e4f09fae181c9a9120.exe windows:5 windows x86 arch:x86
Password: infected
a307d082c4aecf25e2419afa8a600e4c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
setupapi
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInterfaces
SetupDiGetClassDevsW
SetupDiGetDeviceInterfaceDetailW
advapi32
RegCloseKey
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegEnumValueW
RegFlushKey
RegOpenKeyExA
RegOpenKeyExW
RegQueryInfoKeyW
RegQueryValueExA
RegQueryValueExW
RegSetValueExW
kernel32
CloseHandle
CreateFileA
CreateFileMappingA
CreateFileW
CreatePipe
CreateProcessW
CreateSemaphoreW
CreateThread
DecodePointer
DeleteAtom
DeleteCriticalSection
DeleteFileW
DeviceIoControl
DosDateTimeToFileTime
DuplicateHandle
EncodePointer
EnterCriticalSection
ExitProcess
ExpandEnvironmentStringsA
ExpandEnvironmentStringsW
FileTimeToSystemTime
FindAtomW
FindCloseChangeNotification
FindFirstChangeNotificationW
FindFirstFileExW
FindFirstFileW
FindNextChangeNotification
FindNextFileW
FormatMessageW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetComputerNameW
GetCurrencyFormatW
GetCurrentDirectoryW
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatW
GetDiskFreeSpaceExW
GetDiskFreeSpaceW
GetDriveTypeW
GetEnvironmentStrings
GetExitCodeProcess
GetFileAttributesExW
GetFileAttributesW
GetFileInformationByHandle
GetFileSizeEx
GetFileType
GetFullPathNameW
GetLastError
GetLocalTime
GetLocaleInfoW
GetLogicalDriveStringsW
GetLogicalDrives
GetLongPathNameW
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetOEMCP
GetOverlappedResult
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemDirectoryW
GetSystemInfo
GetSystemTime
GetSystemTimeAsFileTime
GetTempPathW
GetThreadPriority
GetTickCount
GetTimeFormatW
GetUserDefaultLCID
GetUserDefaultLangID
GetUserDefaultUILanguage
GetVersion
GetVersionExW
GetVolumeInformationW
GetVolumeNameForVolumeMountPointW
GlobalAlloc
GlobalFree
GlobalLock
GlobalMemoryStatus
GlobalSize
GlobalUnlock
HeapAlloc
HeapFree
HeapSetInformation
InitializeCriticalSection
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsDBCSLeadByteEx
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
IsValidLanguageGroup
IsValidLocale
LCMapStringA
LeaveCriticalSection
LoadLibraryA
LoadLibraryW
LocalFree
MapViewOfFile
MoveFileW
MultiByteToWideChar
OpenFileMappingA
OpenFileMappingW
OpenProcess
OutputDebugStringW
PeekNamedPipe
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
ReadFile
ReleaseSemaphore
RemoveDirectoryW
ResetEvent
ResumeThread
RtlUnwind
SetConsoleCtrlHandler
SetCurrentDirectoryW
SetEndOfFile
SetErrorMode
SetEvent
SetFileAttributesW
SetFilePointer
SetFilePointerEx
SetFileTime
SetHandleCount
SetThreadPriority
SetUnhandledExceptionFilter
Sleep
SwitchToThread
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
TerminateProcess
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnmapViewOfFile
VerSetConditionMask
VerifyVersionInfoW
VirtualAlloc
VirtualFree
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcmpW
lstrlenA
gdi32
CreatePalette
CreateRectRgn
DeleteDC
DeleteObject
EnumFontFamiliesExW
ExtTextOutW
GdiFlush
GetCharABCWidthsFloatW
GetCharABCWidthsI
GetCharABCWidthsW
GetDIBits
GetDeviceCaps
GetFontData
GetGlyphOutlineW
GetObjectW
GetOutlineTextMetricsW
GetPaletteEntries
GetRegionData
GetStockObject
GetTextExtentPoint32W
GetTextFaceW
GetTextMetricsW
OffsetRgn
PtInRegion
RealizePalette
SelectClipRgn
SelectObject
SelectPalette
SetBkMode
SetGraphicsMode
SetMapMode
SetTextAlign
SetTextColor
SetWorldTransform
user32
CreateCursor
CreateIconIndirect
CreateWindowExW
DefWindowProcW
DestroyCaret
DestroyCursor
DestroyIcon
DestroyWindow
DispatchMessageW
DrawIconEx
EmptyClipboard
EnableMenuItem
EnableWindow
EnumThreadWindows
EnumWindows
FlashWindowEx
GetActiveWindow
GetAsyncKeyState
GetCaretBlinkTime
GetClassInfoW
GetClientRect
GetClipboardFormatNameW
GetCursorPos
GetDC
GetDesktopWindow
GetDoubleClickTime
GetFocus
GetIconInfo
GetKeyState
GetKeyboardLayoutList
GetKeyboardState
GetMenu
GetMenuItemCount
GetMenuItemInfoW
GetMessagePos
GetParent
GetQueueStatus
GetSysColorBrush
GetSystemMetrics
GetUpdateRect
GetWindowLongA
GetWindowLongW
GetWindowPlacement
GetWindowRect
GetWindowRgn
GetWindowThreadProcessId
HideCaret
InvalidateRect
InvalidateRgn
IsChild
IsIconic
IsWindowEnabled
IsWindowVisible
IsZoomed
KillTimer
LoadIconW
LoadImageW
MapVirtualKeyW
MessageBeep
MessageBoxA
MoveWindow
MsgWaitForMultipleObjectsEx
PeekMessageW
PostMessageW
PostThreadMessageW
RegisterClassExW
RegisterClassW
RegisterClipboardFormatW
RegisterWindowMessageW
ReleaseCapture
ReleaseDC
ScreenToClient
ScrollWindowEx
SendMessageW
SetCapture
SetCaretBlinkTime
SetCaretPos
SetClipboardViewer
SetCursorPos
SetDoubleClickTime
SetFocus
SetForegroundWindow
SetMenuItemInfoW
SetParent
SetTimer
SetWindowLongW
SetWindowPlacement
SetWindowPos
SetWindowRgn
SetWindowTextW
SetWindowsHookExW
ShowWindow
SystemParametersInfoW
ToAscii
ToUnicode
TrackPopupMenuEx
TranslateMessage
UnhookWindowsHookEx
UnregisterClassW
UpdateWindow
ValidateRgn
WindowFromPoint
wsprintfA
wsprintfW
GetSystemMenu
imm32
ImmSetCandidateWindow
ImmSetCompositionFontW
ImmSetCompositionWindow
ole32
CoInitialize
CoLockObjectExternal
CoTaskMemFree
CoUninitialize
CreateILockBytesOnHGlobal
CreateStreamOnHGlobal
DoDragDrop
OleCreateFromFile
OleFlushClipboard
OleGetClipboard
OleInitialize
OleIsCurrentClipboard
OleLockRunning
OleRun
OleSetClipboard
OleSetMenuDescriptor
OleUninitialize
RegisterDragDrop
ReleaseStgMedium
RevokeDragDrop
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
StringFromGUID2
oleaut32
GetErrorInfo
ws2_32
WSANtohs
WSARecvFrom
WSASendTo
WSASocketW
send
Sections
.text Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 14.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 242KB - Virtual size: 242KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.relof Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE