Static task
static1
Behavioral task
behavioral1
Sample
SHARK (3).exe
Resource
win10v2004-20240802-en
General
-
Target
240913-q5r2ksshjj_pw_infected.zip
-
Size
12.3MB
-
MD5
3373ff426585567d4c95b8b5de7637dd
-
SHA1
6cfe65f3fefe72451b8930f7349b53c69f24fd54
-
SHA256
3165dcdbaf447b0f9e0d4a458850f63104e0f8dd9f75bc75b874e42275882444
-
SHA512
1e5f9daec4c71ef175cb41b755bd24ec15bf0eecb7876107df5e5c24ab796866d8a808f6a50796169f0abc8d19276d92a27ee8768e32ee612092dd1a7f3a5ad9
-
SSDEEP
196608:9nXqLwHHKxtj+hCwYksHD06zDNLcOaIjddesnRLbv02CvbKXDBsw744CaL7avK/o:9n66q3j+hCdD3/N8U2ukwo4CaLGx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/SHARK (3).exe
Files
-
240913-q5r2ksshjj_pw_infected.zip.zip
Password: infected
-
SHARK (3).exe.exe windows:6 windows x64 arch:x64
Password: infected
01f9f6963ed69e2eb7049de9a6cd2317
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
HeapFree
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
advapi32
ConvertSidToStringSidW
ole32
CoInitializeSecurity
oleaut32
SysFreeString
msvcp140
?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
normaliz
IdnToAscii
crypt32
CertGetCertificateChain
wldap32
ord143
ws2_32
listen
userenv
UnloadUserProfile
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__current_exception_context
api-ms-win-crt-runtime-l1-1-0
_seh_filter_exe
api-ms-win-crt-stdio-l1-1-0
fgetpos
api-ms-win-crt-heap-l1-1-0
realloc
api-ms-win-crt-math-l1-1-0
_dsign
api-ms-win-crt-string-l1-1-0
tolower
api-ms-win-crt-convert-l1-1-0
strtoll
api-ms-win-crt-filesystem-l1-1-0
_access
api-ms-win-crt-locale-l1-1-0
localeconv
api-ms-win-crt-environment-l1-1-0
_putenv_s
api-ms-win-crt-time-l1-1-0
_gmtime64
api-ms-win-crt-utility-l1-1-0
qsort
Sections
.text Size: - Virtual size: 544KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 8.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.]VE Size: - Virtual size: 2.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.<ul Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ZP] Size: 12.5MB - Virtual size: 12.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ