Overview
overview
9Static
static
3Malware_pack_2.zip
windows10-1703-x64
1Malware_pa...00.zip
windows10-1703-x64
1Malware_pa...um.zip
windows10-1703-x64
1Malware_pa...ug.zip
windows10-1703-x64
3Malware_pa...le.zip
windows10-1703-x64
1Malware_pa...on.zip
windows10-1703-x64
1Malware_pa...us.zip
windows10-1703-x64
1Malware_pa...rd.zip
windows10-1703-x64
1Malware_pa...1).zip
windows10-1703-x64
1MEMZ 3.0/MEMZ.bat
windows10-1703-x64
7MEMZ 3.0/MEMZ.exe
windows10-1703-x64
7Malware_pa...eg.zip
windows10-1703-x64
1Malware_pa...ld.zip
windows10-1703-x64
1Malware_pa....A.zip
windows10-1703-x64
1Malware_pa...al.zip
windows10-1703-x64
1Malware_pa...15.zip
windows10-1703-x64
1Malware_pa...er.zip
windows10-1703-x64
1Malware_pa...al.exe
windows10-1703-x64
9Malware_pa...0r.zip
windows10-1703-x64
1Malware_pa...ro.zip
windows10-1703-x64
1Malware_pa...od.zip
windows10-1703-x64
1Malware_pa...ot.zip
windows10-1703-x64
1Malware_pa...mb.zip
windows10-1703-x64
1Static task
static1
Behavioral task
behavioral1
Sample
Malware_pack_2.zip
Resource
win10-20240611-en
Behavioral task
behavioral2
Sample
Malware_pack_2/000.zip
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
Malware_pack_2/Antivirus Platinum.zip
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
Malware_pack_2/ColorBug.zip
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
Malware_pack_2/DesktopPuzzle.zip
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
Malware_pack_2/FakeActivation.zip
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
Malware_pack_2/Happy Antivirus.zip
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
Malware_pack_2/InternetSecurityGuard.zip
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
Malware_pack_2/MEMZ 3.0 (1).zip
Resource
win10-20240404-en
Behavioral task
behavioral10
Sample
MEMZ 3.0/MEMZ.bat
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
MEMZ 3.0/MEMZ.exe
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
Malware_pack_2/Movie.mpeg.zip
Resource
win10-20240611-en
Behavioral task
behavioral13
Sample
Malware_pack_2/NavaShield.zip
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
Malware_pack_2/Petya.A.zip
Resource
win10-20240404-en
Behavioral task
behavioral15
Sample
Malware_pack_2/Security Central.zip
Resource
win10-20240404-en
Behavioral task
behavioral16
Sample
Malware_pack_2/Security Defender 2015.zip
Resource
win10-20240404-en
Behavioral task
behavioral17
Sample
Malware_pack_2/SmartDefragmenter.zip
Resource
win10-20240611-en
Behavioral task
behavioral18
Sample
Malware_pack_2/VineMEMZ-Original.exe
Resource
win10-20240404-en
Behavioral task
behavioral19
Sample
Malware_pack_2/WannaCrypt0r.zip
Resource
win10-20240404-en
Behavioral task
behavioral20
Sample
Malware_pack_2/Windows Accelerator Pro.zip
Resource
win10-20240404-en
Behavioral task
behavioral21
Sample
Malware_pack_2/Winlocker.VB6.Blacksod.zip
Resource
win10-20240404-en
Behavioral task
behavioral22
Sample
Malware_pack_2/YouAreAnIdiot.zip
Resource
win10-20240404-en
Behavioral task
behavioral23
Sample
Malware_pack_2/zip bomb.zip
Resource
win10-20240404-en
General
-
Target
Malware_pack_2.zip
-
Size
62.5MB
-
MD5
ab07bd7fa8fae3d6a772bceead6f6139
-
SHA1
eb6264f322b43a5efda1916aa22a017f08a3306c
-
SHA256
3d4c345b9b6c298b218274cfe2141b2f2842b113534a557100c1671a8b7edb76
-
SHA512
74d7f15603f2eb09b8ea577fc378efa47afb5417aaa54f88a2b425a5650e6d6f2db1a3aca1fa9df4dffe287dc50d64cdd790704eb1d1cb187913f28c8f9046a9
-
SSDEEP
1572864:EflnQbz0AkYG9iWbxDl7P7+Ph56glTbRrQlmW7C:gu/k/9iml7P7+PqobFQlLC
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack009/MEMZ 3.0/MEMZ.exe unpack001/Malware_pack_2/VineMEMZ-Original.exe
Files
-
Malware_pack_2.zip.zip
-
Malware_pack_2/000.zip.zip
-
Malware_pack_2/Antivirus Platinum.zip.zip
-
Malware_pack_2/ColorBug.zip.zip
-
Malware_pack_2/DesktopPuzzle.zip.zip
-
Malware_pack_2/FakeActivation.zip.zip
-
Malware_pack_2/Happy Antivirus.zip.zip
-
Malware_pack_2/InternetSecurityGuard.zip.zip
-
Malware_pack_2/MEMZ 3.0 (1).zip.zip
-
MEMZ 3.0/MEMZ.bat.bat .vbs
-
MEMZ 3.0/MEMZ.exe.exe windows:5 windows x86 arch:x86
02ea6193bc4d1a72912388cc9f90424b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
CloseHandle
lstrcmpA
lstrcmpW
LoadLibraryA
GetModuleFileNameA
GetCommandLineW
Sleep
SetPriorityClass
CreateToolhelp32Snapshot
Process32First
Process32Next
GlobalAlloc
GlobalFree
lstrlenW
GetCurrentThreadId
CreateThread
ExitProcess
GetCurrentProcess
OpenProcess
LocalFree
LocalAlloc
CreateFileA
GetProcAddress
user32
ReleaseDC
GetWindowRect
MessageBoxW
SetCursorPos
GetCursorPos
GetDesktopWindow
EnumWindows
GetWindow
CallNextHookEx
GetWindowDC
UnhookWindowsHookEx
MessageBoxA
GetSystemMetrics
CreateWindowExA
RegisterClassExA
DefWindowProcA
ExitWindowsEx
DispatchMessageA
TranslateMessage
DrawIcon
SendInput
LoadIconA
SendMessageW
GetMessageA
SetWindowsHookExA
gdi32
BitBlt
StretchBlt
advapi32
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueA
CryptAcquireContextA
CryptGenRandom
shell32
CommandLineToArgvW
ShellExecuteA
ShellExecuteExA
winmm
PlaySoundA
psapi
GetProcessImageFileNameA
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Malware_pack_2/Movie.mpeg.zip.zip
-
Malware_pack_2/NavaShield.zip.zip
-
Malware_pack_2/Petya.A.zip.zip
-
Malware_pack_2/Security Central.zip.zip
-
Malware_pack_2/Security Defender 2015.zip.zip
-
Malware_pack_2/SmartDefragmenter.zip.zip
-
Malware_pack_2/VineMEMZ-Original.exe.exe windows:4 windows x86 arch:x86
b5a014d7eeb4c2042897567e1288a095
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
kernel32
GetFileAttributesW
CreateDirectoryW
WriteFile
GetStdHandle
VirtualFree
GetModuleHandleW
GetProcAddress
LoadLibraryA
LockResource
LoadResource
SizeofResource
FindResourceExA
MulDiv
GlobalFree
GlobalAlloc
lstrcmpiA
GetSystemDefaultLCID
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
MultiByteToWideChar
GetLocaleInfoW
lstrlenA
lstrcmpiW
GetEnvironmentVariableW
lstrcmpW
GlobalMemoryStatusEx
VirtualAlloc
WideCharToMultiByte
ExpandEnvironmentStringsW
RemoveDirectoryW
FindClose
FindNextFileW
DeleteFileW
FindFirstFileW
SetThreadLocale
GetLocalTime
GetSystemTimeAsFileTime
lstrlenW
GetTempPathW
SetEnvironmentVariableW
CloseHandle
CreateFileW
GetDriveTypeW
SetCurrentDirectoryW
GetModuleFileNameW
GetCommandLineW
GetVersionExW
CreateEventW
SetEvent
ResetEvent
InitializeCriticalSection
TerminateThread
ResumeThread
SuspendThread
IsBadReadPtr
LocalFree
lstrcpyW
FormatMessageW
GetSystemDirectoryW
DeleteCriticalSection
GetFileSize
SetFilePointer
ReadFile
SetFileTime
SetEndOfFile
EnterCriticalSection
LeaveCriticalSection
WaitForMultipleObjects
GetModuleHandleA
SystemTimeToFileTime
GetLastError
CreateThread
WaitForSingleObject
GetExitCodeThread
Sleep
SetLastError
SetFileAttributesW
GetDiskFreeSpaceExW
lstrcatW
ExitProcess
CompareFileTime
GetStartupInfoA
user32
CharUpperW
EndDialog
DestroyWindow
KillTimer
ReleaseDC
DispatchMessageW
GetMessageW
SetTimer
CreateWindowExW
ScreenToClient
GetWindowRect
wsprintfW
GetParent
GetSystemMenu
EnableMenuItem
EnableWindow
MessageBeep
LoadIconW
LoadImageW
wvsprintfW
IsWindow
DefWindowProcW
CallWindowProcW
DrawIconEx
DialogBoxIndirectParamW
GetWindow
ClientToScreen
GetDC
DrawTextW
ShowWindow
SystemParametersInfoW
SetFocus
SetWindowLongW
GetSystemMetrics
GetClientRect
GetDlgItem
GetKeyState
MessageBoxA
wsprintfA
SetWindowTextW
GetSysColor
GetWindowTextLengthW
GetWindowTextW
GetClassNameA
GetWindowLongW
GetMenu
SetWindowPos
CopyImage
SendMessageW
GetWindowDC
gdi32
GetCurrentObject
StretchBlt
SetStretchBltMode
CreateCompatibleBitmap
SelectObject
CreateCompatibleDC
GetObjectW
GetDeviceCaps
DeleteObject
CreateFontIndirectW
DeleteDC
shell32
SHGetFileInfoW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetMalloc
ShellExecuteExW
SHGetSpecialFolderPathW
ShellExecuteW
ole32
CoInitialize
CreateStreamOnHGlobal
CoCreateInstance
oleaut32
VariantClear
OleLoadPicture
SysAllocString
msvcrt
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
_onexit
__dllonexit
_CxxThrowException
_beginthreadex
_EH_prolog
memset
_wcsnicmp
strncmp
malloc
memmove
_wtol
memcpy
free
memcmp
_purecall
??2@YAPAXI@Z
??3@YAXPAX@Z
_except_handler3
_controlfp
Sections
.text Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
Malware_pack_2/WannaCrypt0r.zip.zip
-
Malware_pack_2/Windows Accelerator Pro.zip.zip
-
Malware_pack_2/Winlocker.VB6.Blacksod.zip.zip
-
Malware_pack_2/YouAreAnIdiot.zip.zip
-
Malware_pack_2/zip bomb.zip.zip