geeffly
Static task
static1
Behavioral task
behavioral1
Sample
rev inv07014.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
rev inv07014.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
zwgay.dll
Resource
win7-20240903-en
General
-
Target
57fde6ab463eabd779e138a0ef61807a8e587894d65e2a215378ab6ba9963429
-
Size
175KB
-
MD5
0ac187f9e162bb741a5afaabe7553cf9
-
SHA1
4442b73675408b13c32fea896ac09a6a06e09a49
-
SHA256
57fde6ab463eabd779e138a0ef61807a8e587894d65e2a215378ab6ba9963429
-
SHA512
ac532ef2fbc5ae9649be142c3f232fc2413ec4fb0779e214ea279a6c4e4d891a13d182e7d8fc57baf424cc96f11aa175831088969db5368f140a560fd172a03b
-
SSDEEP
3072:ZSloIVFfYWV8LffVWnKMyPxBVQsm2HRBP97WkW554dGgdglvfoKnOrzgTgXRp7mf:ZbIVFRV8LffVWKMQJY2zpbkXoXzEahmf
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack002/rev inv07014.exe unpack003/zwgay.dll -
NSIS installer 2 IoCs
resource yara_rule static1/unpack002/rev inv07014.exe nsis_installer_1 static1/unpack002/rev inv07014.exe nsis_installer_2
Files
-
57fde6ab463eabd779e138a0ef61807a8e587894d65e2a215378ab6ba9963429.zip
Password: infected
-
RFQ20001016.rar.1.rar
-
rev inv07014.exe.exe windows:4 windows x86 arch:x86
ced282d9b261d1462772017fe2f6972b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCreateKeyExA
RegEnumKeyA
RegQueryValueExA
RegSetValueExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
SetFileSecurityA
RegOpenKeyExA
RegEnumValueA
shell32
SHGetFileInfoA
SHFileOperationA
SHGetPathFromIDListA
ShellExecuteExA
SHGetSpecialFolderLocation
SHBrowseForFolderA
ole32
IIDFromString
OleInitialize
OleUninitialize
CoCreateInstance
CoTaskMemFree
comctl32
ord17
ImageList_Create
ImageList_Destroy
ImageList_AddMasked
user32
SetClipboardData
CharPrevA
CallWindowProcA
PeekMessageA
DispatchMessageA
MessageBoxIndirectA
GetDlgItemTextA
SetDlgItemTextA
GetSystemMetrics
CreatePopupMenu
AppendMenuA
TrackPopupMenu
FillRect
EmptyClipboard
LoadCursorA
GetMessagePos
CheckDlgButton
GetSysColor
SetCursor
GetWindowLongA
SetClassLongA
SetWindowPos
IsWindowEnabled
GetWindowRect
GetSystemMenu
EnableMenuItem
RegisterClassA
ScreenToClient
EndDialog
GetClassInfoA
SystemParametersInfoA
CreateWindowExA
ExitWindowsEx
DialogBoxParamA
CharNextA
SetTimer
DestroyWindow
CreateDialogParamA
SetForegroundWindow
SetWindowTextA
PostQuitMessage
SendMessageTimeoutA
ShowWindow
wsprintfA
GetDlgItem
FindWindowExA
IsWindow
GetDC
SetWindowLongA
LoadImageA
InvalidateRect
ReleaseDC
EnableWindow
BeginPaint
SendMessageA
DefWindowProcA
DrawTextA
GetClientRect
EndPaint
IsWindowVisible
CloseClipboard
OpenClipboard
gdi32
SetBkMode
SetBkColor
GetDeviceCaps
CreateFontIndirectA
CreateBrushIndirect
DeleteObject
SetTextColor
SelectObject
kernel32
GetExitCodeProcess
WaitForSingleObject
GetProcAddress
GetSystemDirectoryA
WideCharToMultiByte
MoveFileExA
ReadFile
GetTempFileNameA
WriteFile
RemoveDirectoryA
CreateProcessA
CreateFileA
GetLastError
CreateThread
CreateDirectoryA
GlobalUnlock
GetDiskFreeSpaceA
GlobalLock
SetErrorMode
GetVersion
lstrcpynA
GetCommandLineA
GetTempPathA
lstrlenA
SetEnvironmentVariableA
ExitProcess
GetWindowsDirectoryA
GetCurrentProcess
GetModuleFileNameA
CopyFileA
GetTickCount
Sleep
GetFileSize
GetFileAttributesA
SetCurrentDirectoryA
SetFileAttributesA
GetFullPathNameA
GetShortPathNameA
MoveFileA
CompareFileTime
SetFileTime
SearchPathA
lstrcmpiA
lstrcmpA
CloseHandle
GlobalFree
GlobalAlloc
ExpandEnvironmentStringsA
LoadLibraryExA
FreeLibrary
lstrcpyA
lstrcatA
FindClose
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
SetFilePointer
GetModuleHandleA
FindNextFileA
FindFirstFileA
DeleteFileA
MulDiv
Sections
.text Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ndata Size: - Virtual size: 32KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
owi0afbr6m7dx00zw66w
-
zwgay.dll.dll windows:6 windows x86 arch:x86
bdbdcbee6c6e64764011f4f63b7da9af
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
msi
ord7
ord86
ord21
ord138
ord72
ord158
ord164
ord87
rpcrt4
NdrEncapsulatedUnionBufferSize
RpcCancelThreadEx
RpcServerUseAllProtseqsIfEx
NdrSimpleStructMemorySize
NdrUserMarshalMemorySize
NdrComplexArrayUnmarshall
RpcServerUseProtseqEpW
I_RpcBindingIsClientLocal
loadperf
LoadPerfCounterTextStringsW
UnloadPerfCounterTextStringsW
UnloadPerfCounterTextStringsA
wininet
FindNextUrlCacheEntryExA
FtpGetCurrentDirectoryW
DeleteUrlCacheGroup
HttpOpenRequestA
InternetGetCookieA
gdi32
GetMetaFileW
SetDIBits
SetPaletteEntries
CreatePatternBrush
PolyPolyline
CreateRectRgnIndirect
DeleteColorSpace
ws2_32
WSASetServiceW
WSAEventSelect
getsockopt
WSALookupServiceBeginW
WSACleanup
inet_ntoa
WSAAddressToStringW
WSAAsyncGetHostByName
WSARecv
setsockopt
msacm32
acmMessage32
acmFilterEnumA
acmFilterEnumW
acmDriverAddA
acmDriverRemove
acmStreamConvert
acmFilterTagEnumA
acmStreamReset
acmStreamSize
crypt32
CertEnumCertificateContextProperties
CryptFreeOIDFunctionAddress
CertCreateCTLContext
CryptUnregisterDefaultOIDFunction
CryptInstallOIDFunctionAddress
Exports
Exports
Sections
.text Size: 512B - Virtual size: 481B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ