Behavioral task
behavioral1
Sample
381333799197cdf21b4d12d9ce83587673c52b336547a5425bbd9c69bba00d5f.exe
Resource
win7-20240508-en
General
-
Target
381333799197cdf21b4d12d9ce83587673c52b336547a5425bbd9c69bba00d5f.zip
-
Size
134KB
-
MD5
ef0bde59ac1b1fbac9cd1fe0c9041313
-
SHA1
c8fe5de409be59a5c01fb5a6529d50476a64f73c
-
SHA256
9effd1d916479ebfecd12f3650088aae8883eb4929835c26fe2dd3c5b7351f04
-
SHA512
135867d3ea58b3f86f3f33712cf1c0a44278bbff732d587a1eff379c574d392d632ce1de8304c42a6747fa6b82e23c00192027eb78d6c139c7fd57bb29e70cc6
-
SSDEEP
3072:3hvqWgry/5LNmrPCC+2HWnZda8ZTo2l+48DG3lSODKl6JsV:RCWgryhg+CTHkZc0TKXDGVSOrJsV
Malware Config
Extracted
cryptbot
unic16m.top
unic16e.top
Signatures
-
Cryptbot family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/381333799197cdf21b4d12d9ce83587673c52b336547a5425bbd9c69bba00d5f.exe
Files
-
381333799197cdf21b4d12d9ce83587673c52b336547a5425bbd9c69bba00d5f.zip.zip
Password: infected
-
381333799197cdf21b4d12d9ce83587673c52b336547a5425bbd9c69bba00d5f.exe.exe windows:6 windows x86 arch:x86
Password: infected
5e83a2a4f8bd496b2fc660065aba6076
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameW
GlobalMemoryStatusEx
GetFileSizeEx
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
ReadFile
WriteFile
SetFilePointer
GetFileInformationByHandle
FileTimeToSystemTime
GetLocalTime
LocalFree
SystemTimeToFileTime
WideCharToMultiByte
GetTickCount
GetPrivateProfileStringW
ExitProcess
SetEndOfFile
WriteConsoleW
HeapReAlloc
HeapSize
FlushFileBuffers
GetStringTypeW
GetUserDefaultLocaleName
GetSystemInfo
CloseHandle
FindClose
Sleep
GetFileAttributesW
CreateFileW
LocalAlloc
GetLocaleInfoW
GetFileSize
GetModuleFileNameW
RemoveDirectoryW
FindNextFileW
FindFirstFileW
CreateDirectoryW
CopyFileW
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetTimeZoneInformation
LCMapStringW
DecodePointer
CompareStringW
GetTimeFormatW
GetDateFormatW
ReadConsoleW
SetStdHandle
ExpandEnvironmentStringsW
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetCurrentProcess
TerminateProcess
RtlUnwind
RaiseException
GetLastError
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetModuleHandleExW
GetStdHandle
HeapFree
HeapAlloc
GetFileType
GetConsoleOutputCP
GetConsoleMode
SetFilePointerEx
user32
GetKeyboardLayoutList
GetWindowRect
GetSystemMetrics
GetDesktopWindow
GetWindowDC
gdi32
GetDeviceCaps
BitBlt
SaveDC
SelectObject
CreateDIBSection
CreateCompatibleDC
DeleteDC
RestoreDC
DeleteObject
advapi32
GetUserNameW
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegQueryValueExW
shell32
ShellExecuteW
SHFileOperationW
gdiplus
GdipGetImageEncodersSize
GdipSaveImageToFile
GdipDisposeImage
GdipCreateBitmapFromHBITMAP
GdipCloneImage
GdipGetImageEncoders
GdiplusShutdown
GdiplusStartup
GdipFree
GdipAlloc
wininet
HttpEndRequestW
InternetOpenW
HttpSendRequestExW
HttpAddRequestHeadersA
InternetConnectW
HttpOpenRequestW
InternetWriteFile
crypt32
CryptUnprotectData
Sections
.text Size: 208KB - Virtual size: 207KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ