Static task
static1
Behavioral task
behavioral1
Sample
d7ccfd24cea840cd3adf9cbedf1063ff730c268c7676808f83193042e8059411.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d7ccfd24cea840cd3adf9cbedf1063ff730c268c7676808f83193042e8059411.exe
Resource
win10v2004-20240802-en
General
-
Target
19110548687.zip
-
Size
219KB
-
MD5
d2f4b29d915df57cbb525e08af22ae7a
-
SHA1
b0610d2deac96d7e1dfa528cb7336eee39a75c35
-
SHA256
3b4cdf9053dc96377cf96d0714ff2eba294b68e0062da1448c6645540b312931
-
SHA512
0a443d3593c559174d00df9fb6e605e3109edc00537d77edc8fdf3e92b082e3fcf159310a3873800b850b45087dfa041dba70193603d9fdee1ec42c4961cc2cd
-
SSDEEP
6144:Gekvjt+/asIvY0DTCGNWTbjV8mbGhl/7w:CvQasIvldcp9elc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/d7ccfd24cea840cd3adf9cbedf1063ff730c268c7676808f83193042e8059411
Files
-
19110548687.zip.zip
Password: infected
-
d7ccfd24cea840cd3adf9cbedf1063ff730c268c7676808f83193042e8059411.exe windows:5 windows x86 arch:x86
d78a57f64a14336a30fd7584cb307da1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedDecrement
GetCurrentProcess
GetLogicalDriveStringsW
InterlockedCompareExchange
SetVolumeMountPointW
GetModuleHandleW
CreateNamedPipeW
FindNextVolumeMountPointA
GetNumberFormatA
CreateActCtxW
TlsSetValue
SetFileShortNameW
LoadLibraryW
LocalShrink
GetLocaleInfoW
GetCalendarInfoA
SetConsoleCP
GetFileAttributesW
GetModuleFileNameW
GetShortPathNameA
CreateJobObjectA
LCMapStringA
VerifyVersionInfoW
InterlockedExchange
GlobalUnfix
GetLastError
SetLastError
GetProcAddress
EnumSystemCodePagesW
GetConsoleDisplayMode
SetComputerNameA
LoadModule
SetThreadPriorityBoost
GetCommState
GetFileType
CreateFileMappingW
CreateHardLinkW
GetNumberFormatW
CreateEventW
FoldStringA
SetEnvironmentVariableA
EnumDateFormatsA
GetProcessShutdownParameters
LoadLibraryExA
VirtualProtect
GetCurrentDirectoryA
GetFileTime
OpenEventW
PeekConsoleInputA
SetCalendarInfoA
GetVersionExA
GetDiskFreeSpaceExW
GetWindowsDirectoryW
DebugBreak
GetTempPathA
EnumCalendarInfoExA
CommConfigDialogW
RaiseException
RtlUnwind
IsProcessorFeaturePresent
GetStringTypeW
LCMapStringW
GetConsoleAliasExesLengthA
SetEndOfFile
GetConsoleAliasExesA
EnumCalendarInfoA
GlobalMemoryStatus
LocalAlloc
SetDefaultCommConfigA
WideCharToMultiByte
HeapFree
HeapAlloc
MultiByteToWideChar
EncodePointer
DecodePointer
HeapReAlloc
GetCommandLineW
HeapSetInformation
GetStartupInfoW
HeapCreate
ExitProcess
WriteFile
GetStdHandle
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsFree
GetCurrentThreadId
Sleep
HeapSize
SetUnhandledExceptionFilter
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
UnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
LeaveCriticalSection
EnterCriticalSection
user32
CharUpperA
SetCaretPos
LoadMenuA
GetMenuStringW
GetWindowLongW
InsertMenuItemW
GetMenu
DrawStateW
gdi32
GetCharWidthFloatA
CreateDCA
DeleteMetaFile
GetCharWidth32A
GetTextMetricsA
GetBkMode
ole32
CoUnmarshalHresult
Sections
.text Size: 222KB - Virtual size: 222KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 32.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.deh Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.kuduw Size: 512B - Virtual size: 214B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.yewunof Size: 1024B - Virtual size: 923B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xumi Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ