Static task
static1
Behavioral task
behavioral1
Sample
Diver-Office_2010_1_Setup.exe
Resource
win11-20240802-en
General
-
Target
0717d1c1db4794eb55d5de73e9f87b701c64a71901fb6291726ec89edd6b995d.zip
-
Size
39.9MB
-
MD5
1df40159922a68d9994fe4083fb2e17d
-
SHA1
a276623c554147fce93ec06594943ec4c6c73101
-
SHA256
4e87f18c033b03aae640ed53d61721ec92668e9dccc100d47d8012fb956b82a4
-
SHA512
0223e388575e2c6ceef64e227a1637c7b1315df39d086c3f8a0ec83586f60c5da9055b553a3150c58d8832f562de0c097aafc7f65a428bc1e4fe47e16ff10897
-
SSDEEP
786432:zkiYlyQADSiIFevPt1d+++5grIoNO4N962wQ/0Xw5k6SwrgvJqVZUHLab7vQSNeZ:4OQTFSlriGrIUxA2wS59Swr/Zu+pNY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Diver-Office_2010_1_Setup.exe
Files
-
0717d1c1db4794eb55d5de73e9f87b701c64a71901fb6291726ec89edd6b995d.zip.zip
Password: infected
-
Diver-Office_2010_1_Setup.exe.exe windows:4 windows x86 arch:x86
1b1f8bafc7e8e1dafb58725e16275805
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
GetVersionExA
OpenFile
FreeLibrary
GetProcAddress
LoadLibraryA
_lcreat
WinExec
_lopen
GetModuleFileNameA
GetModuleHandleA
GetCommandLineA
SetErrorMode
ExitProcess
_lwrite
GetLastError
lstrcatA
GlobalLock
FormatMessageA
LocalFree
lstrcpyA
GetTempPathA
GetWindowsDirectoryA
GetTempFileNameA
MulDiv
lstrlenA
_lread
_llseek
GlobalUnlock
GlobalFree
GlobalAlloc
_lclose
user32
ExitWindowsEx
wsprintfA
CreateWindowExA
ShowWindow
SetWindowPos
UpdateWindow
SetTimer
LoadIconA
LoadCursorA
RegisterClassA
MessageBoxA
BeginPaint
DrawTextA
EndPaint
InvalidateRect
PostQuitMessage
DefWindowProcA
GetDC
ReleaseDC
GetClientRect
SendMessageA
gdi32
SetTextColor
SetBkMode
SelectObject
StretchDIBits
CreateFontA
TextOutA
RealizePalette
SelectPalette
CreatePalette
GetStockObject
DeleteObject
CreateSolidBrush
GetDeviceCaps
PatBlt
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 776B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ