Static task
static1
Behavioral task
behavioral1
Sample
Setup_02024.exe
Resource
win10v2004-20240802-en
General
-
Target
Setup_02024 (infected).zip
-
Size
43.9MB
-
MD5
d9b8498df0ba80f0e4ad8eb513268dd2
-
SHA1
1c10d5432e3fdee50093d73a8241c3391d58a42a
-
SHA256
8bed739e3410be0ec91d826c3c67e9ff1747e8a65f549b05f1c09d32c0a37b0c
-
SHA512
07616576aac8faca87c3d7f9f6726f2da07117541af3919be6ca890335097b50447404362df07d13a8215949a6e8b6b1efbe11967da4da187e06a4aed65b6276
-
SSDEEP
786432:XwuYGsc0bcVvwuKzdZSwa9rh9vAZXKKqiAgVxgkhzE6KNGw5aFOAV6:guhsFcVv/KJZ+7DECGCGw5am
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Setup_02024.exe
Files
-
Setup_02024 (infected).zip.zip
Password: infected
-
Setup_02024.exe.exe windows:6 windows x86 arch:x86
Password: infected
f31d0e3bb7029de072fe11f46d5ac202
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFileExistsW
kernel32
GetCurrentThreadId
FreeEnvironmentStringsW
FlushFileBuffers
DecodePointer
GetACP
GetDriveTypeW
SetFilePointer
GetCurrentProcessId
GetFileSizeEx
VerSetConditionMask
RtlUnwind
GetLocaleInfoW
RaiseException
ReadConsoleW
TlsFree
WriteFile
HeapReAlloc
CreateSemaphoreA
SetFileAttributesA
RemoveDirectoryA
GetModuleFileNameW
LCMapStringW
LocalFree
GetFileSize
CreateFileW
GetStartupInfoW
TlsSetValue
GetProcessAffinityMask
SetEndOfFile
AcquireSRWLockExclusive
GetConsoleMode
FindNextFileW
DeleteFileA
GetEnvironmentStringsW
GlobalMemoryStatus
GetCurrentProcess
GetModuleHandleExW
Sleep
GetTickCount64
GetLastError
GetVersionExA
FindFirstFileExA
InitializeCriticalSectionAndSpinCount
AreFileApisANSI
GetConsoleCP
FindNextFileA
GetTempPathA
DeleteFileW
GetSystemDirectoryW
TlsGetValue
CloseHandle
SleepEx
RemoveDirectoryW
GetCommandLineW
lstrcatA
FormatMessageW
WideCharToMultiByte
EnumSystemLocalesW
GetStdHandle
GetLocaleInfoEx
TryAcquireSRWLockExclusive
GetStringTypeW
GetEnvironmentVariableA
InitializeCriticalSectionEx
FormatMessageA
ResetEvent
ReadFile
ReleaseSemaphore
WaitForMultipleObjects
GetUserDefaultLCID
GetFileAttributesExW
QueryPerformanceCounter
MultiByteToWideChar
LoadLibraryA
FreeLibraryAndExitThread
SetFilePointerEx
GetTickCount
LoadLibraryExW
EncodePointer
GetVersion
GetModuleHandleA
CreateThread
TerminateProcess
VerifyVersionInfoW
TlsAlloc
FreeLibrary
CreateEventA
WaitForSingleObject
HeapSize
GetOEMCP
CreateFileA
WaitForSingleObjectEx
GetCurrentDirectoryA
ExitProcess
SetFileAttributesW
InitializeCriticalSection
HeapAlloc
GetCurrentDirectoryW
SetCurrentDirectoryW
GetProcAddress
VirtualFree
GetDateFormatW
GetCommandLineA
FindFirstFileA
PeekNamedPipe
FindFirstFileW
DeleteCriticalSection
GetFinalPathNameByHandleW
LoadLibraryW
LCMapStringEx
IsValidCodePage
LeaveCriticalSection
ReleaseSRWLockExclusive
FindClose
SetStdHandle
GetFileInformationByHandle
MoveFileExW
GetFullPathNameW
GetSystemTimeAsFileTime
GetFileAttributesA
SetCurrentDirectoryA
GetTimeZoneInformation
GetFileType
GetModuleFileNameA
EnterCriticalSection
QueryPerformanceFrequency
SetEvent
GetSystemInfo
GetModuleHandleW
IsProcessorFeaturePresent
CompareStringW
WriteConsoleW
GetTempPathW
SetEnvironmentVariableA
InitializeSListHead
CreateDirectoryW
SetFileTime
GetTimeFormatW
SetUnhandledExceptionFilter
GetFileAttributesW
UnhandledExceptionFilter
CreateDirectoryA
FileTimeToSystemTime
WakeAllConditionVariable
IsDebuggerPresent
SystemTimeToTzSpecificLocalTime
ExitThread
GetCPInfo
IsValidLocale
SetLastError
HeapFree
lstrlenA
VirtualAlloc
GetProcessHeap
user32
MessageBoxW
KillTimer
DialogBoxParamW
SetWindowLongA
SetWindowTextA
EndDialog
ShowWindow
CharUpperA
SetWindowTextW
PostMessageA
SetTimer
LoadStringW
SendMessageA
wsprintfA
GetWindowLongA
GetDlgItem
LoadIconA
MessageBoxA
DialogBoxParamA
CharUpperW
DestroyWindow
LoadStringA
shell32
ShellExecuteExA
oleaut32
VariantClear
SysAllocStringLen
SysStringLen
bcrypt
BCryptGenRandom
advapi32
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptReleaseContext
CryptAcquireContextW
CryptImportKey
CryptEncrypt
CryptGetHashParam
CryptDestroyKey
crypt32
CertOpenStore
CertGetNameStringW
CertAddCertificateContextToStore
CertFreeCertificateContext
PFXImportCertStore
CertFindExtension
CryptQueryObject
CertFindCertificateInStore
CertGetCertificateChain
CryptStringToBinaryW
CertCreateCertificateChainEngine
CertEnumCertificatesInStore
CertCloseStore
CryptDecodeObjectEx
CertFreeCertificateChain
CertFreeCertificateChainEngine
wldap32
ord216
ord301
ord145
ord219
ord46
ord14
ord147
ord73
ord208
ord41
ord117
ord26
ord27
ord127
ord167
ord142
ord79
ord133
ws2_32
gethostname
htons
getsockopt
send
WSAEnumNetworkEvents
WSACreateEvent
WSAEventSelect
getaddrinfo
WSACloseEvent
WSAWaitForMultipleEvents
closesocket
WSAGetLastError
ntohs
WSASetLastError
WSAStartup
WSACleanup
ioctlsocket
setsockopt
WSAResetEvent
__WSAFDIsSet
select
accept
bind
connect
getsockname
htonl
listen
recv
socket
freeaddrinfo
WSAIoctl
recvfrom
sendto
getpeername
Sections
.text Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 200KB - Virtual size: 200KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ