ALG.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a5ecdf1c9ec2b0d8b6ef6902881b2e6345821a894934303d05e04926faf62ac2.exe
Resource
win10v2004-20240802-en
General
-
Target
d0034ef506f11d563c6ec2988074309f.zip
-
Size
297KB
-
MD5
255baa0f6e49643ea01ac34a87fbc335
-
SHA1
593882fb069e9d0c799f5b9801f7292d9ed71e06
-
SHA256
baf9af6cdba68a5fe4606df23081219c55a2b7897b1ae643104e0dab0e8d02b7
-
SHA512
d065eebaf9f52c35f708ed6ee532827ec533c88f2c73eedbd021fa9a10cd0f89589c6fb54540926932371be509482298b506f549ad172f8753f709583efaefa8
-
SSDEEP
6144:dMgZpnscDUZ7NEVk5RVffz7SrcRRV2Sflvhc+eCbvfvqkuK7jTdmCYz7J:SwpnscG7CVuH/4On2SflG+eCbvzN/TdG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/a5ecdf1c9ec2b0d8b6ef6902881b2e6345821a894934303d05e04926faf62ac2
Files
-
d0034ef506f11d563c6ec2988074309f.zip.zip
Password: infected
-
a5ecdf1c9ec2b0d8b6ef6902881b2e6345821a894934303d05e04926faf62ac2.exe windows:10 windows x64 arch:x64
Password: infected
0880969dd70df552ede1edaf71e17a74
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
msvcrt
??1type_info@@UEAA@XZ
exit
_lock
_unlock
__set_app_type
_exit
__dllonexit
__wgetmainargs
_amsg_exit
_XcptFilter
_onexit
?terminate@@YAXXZ
_cexit
_commode
_fmode
_initterm
memcpy
__CxxFrameHandler3
_wcmdln
isdigit
_CxxThrowException
_callnewh
??0exception@@QEAA@AEBQEBDH@Z
memmove
??0exception@@QEAA@XZ
memmove_s
memcpy_s
_wcsicmp
?what@exception@@UEBAPEBDXZ
realloc
wcscat_s
malloc
free
??0exception@@QEAA@AEBV0@@Z
??1exception@@UEAA@XZ
??0exception@@QEAA@AEBQEBD@Z
__C_specific_handler
__setusermatherr
memcmp
memset
api-ms-win-core-synch-l1-1-0
EnterCriticalSection
SetEvent
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
CreateEventW
WaitForSingleObject
api-ms-win-core-libraryloader-l1-2-0
LoadResource
LoadLibraryExW
GetModuleHandleW
FreeLibrary
GetModuleFileNameW
FindResourceExW
SizeofResource
GetProcAddress
api-ms-win-core-string-l2-1-0
CharPrevW
CharNextW
api-ms-win-core-errorhandling-l1-1-0
SetUnhandledExceptionFilter
GetLastError
UnhandledExceptionFilter
RaiseException
api-ms-win-core-registry-l1-1-0
RegEnumKeyExW
RegOpenKeyExW
RegSetValueExW
RegNotifyChangeKeyValue
RegCreateKeyExW
RegDeleteValueW
RegQueryValueExW
RegCloseKey
RegQueryInfoKeyW
RegEnumValueW
api-ms-win-core-memory-l1-1-0
VirtualProtect
VirtualAlloc
VirtualQuery
api-ms-win-core-sysinfo-l1-1-0
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
api-ms-win-core-string-l1-1-0
MultiByteToWideChar
api-ms-win-core-handle-l1-1-0
DuplicateHandle
CloseHandle
api-ms-win-core-synch-l1-2-1
WaitForMultipleObjects
api-ms-win-core-synch-l1-2-0
Sleep
api-ms-win-core-heap-l1-1-0
GetProcessHeap
HeapDestroy
HeapFree
HeapAlloc
HeapSetInformation
api-ms-win-core-processthreads-l1-1-0
GetCurrentThreadId
TerminateProcess
GetCurrentProcessId
CreateThread
GetCurrentProcess
GetStartupInfoW
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-rtlsupport-l1-1-0
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
api-ms-win-core-threadpool-legacy-l1-1-0
CreateTimerQueueTimer
CreateTimerQueue
DeleteTimerQueueEx
DeleteTimerQueueTimer
api-ms-win-core-string-obsolete-l1-1-0
lstrcmpiW
lstrcpynW
cryptbase
SystemFunction036
mswsock
AcceptEx
GetAcceptExSockaddrs
api-ms-win-core-file-l1-1-0
WriteFile
ReadFile
api-ms-win-core-delayload-l1-1-1
ResolveDelayLoadedAPI
api-ms-win-core-delayload-l1-1-0
DelayLoadFailureHook
api-ms-win-core-kernel32-legacy-l1-1-0
BindIoCompletionCallback
Sections
.text Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 512B - Virtual size: 280B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 396KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ