Static task
static1
Behavioral task
behavioral1
Sample
Patch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Patch.exe
Resource
win10v2004-20240802-en
General
-
Target
MDE_File_Sample_97d9b154d20a5584ffb3650d360d3089315d2eba.zip
-
Size
13KB
-
MD5
0f1ec5967e313f49e6e3079bad10c1ae
-
SHA1
fbe3eaaf34238a6cc81cb51ec90ea006f374ead3
-
SHA256
04ed6f2c0bce049c2de6a290890df1236a15c9364e03abdf965c11c503305353
-
SHA512
944145f853db6a64d9beaebcbd1dbd04a4a884da5500cb36a6612838e2f02709cda7831dd67f4d60e972f42ce9053e4634a0303e4ba411974f39731249648295
-
SSDEEP
192:ALzQONEhSFUewaZN72m39hiejqCRiWD7DwoPwINiBbIaJuw1xswIlRDpuFs0:ALEOVGeh9+eiWEoPBWbJRkwiL0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Patch.exe
Files
-
MDE_File_Sample_97d9b154d20a5584ffb3650d360d3089315d2eba.zip.zip
Password: infected
-
Patch.exe.exe .vbs windows:1 windows x86 arch:x86 polyglot
Password: infected
15274303a36b12502995658e3db871fc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CopyFileW
CreateFileW
CreateFileMappingW
CreateProcessW
CreateThread
CreateToolhelp32Snapshot
DeleteFileW
ExitProcess
ExitThread
ExpandEnvironmentStringsW
FreeLibrary
GetCurrentDirectoryW
GetExitCodeProcess
GetFileSize
GetModuleFileNameW
GetModuleHandleW
GetNativeSystemInfo
GetProcAddress
GetSystemDirectoryW
GetVersion
LoadLibraryW
MapViewOfFile
OpenProcess
Process32FirstW
Process32NextW
ResumeThread
RtlZeroMemory
SetFileAttributesW
SetThreadPriority
Sleep
SuspendThread
TerminateProcess
UnmapViewOfFile
WaitForSingleObject
WriteFile
lstrcatW
lstrcmpiW
lstrcpyW
lstrlenA
lstrlenW
user32
CallWindowProcW
CheckDlgButton
DialogBoxParamW
DrawTextA
EnableWindow
EndDialog
FillRect
GetDC
GetDlgItem
GetDlgItemTextW
GetSysColor
GetSysColorBrush
GetWindowLongW
InvalidateRect
IsDlgButtonChecked
LoadCursorW
LoadIconW
MessageBoxW
ReleaseCapture
ReleaseDC
SendDlgItemMessageW
SendMessageW
SetCursor
SetDlgItemTextW
SetWindowLongW
SetWindowPos
gdi32
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreateDIBSection
CreateFontA
CreateSolidBrush
DeleteDC
DeleteObject
GetObjectW
SelectObject
SetBkMode
SetStretchBltMode
SetTextColor
StretchBlt
gdiplus
GdiplusStartup
GdiplusShutdown
GdipCreateBitmapFromStream
GdipDeleteGraphics
GdipDisposeImage
GdipGetImageWidth
GdipGetImageHeight
GdipCreateHBITMAPFromBitmap
ole32
CoTaskMemAlloc
CreateStreamOnHGlobal
comctl32
InitCommonControls
comdlg32
GetOpenFileNameW
shell32
ShellExecuteW
ShellExecuteExW
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegCloseKey
RegCreateKeyExW
RegDeleteValueW
RegSetValueExW
shlwapi
PathFileExistsW
SHDeleteKeyW
psapi
GetModuleFileNameExW
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 7KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ