Static task
static1
Behavioral task
behavioral1
Sample
0e55ead3b8fd305d9a54f78c7b56741a.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0e55ead3b8fd305d9a54f78c7b56741a.exe
Resource
win10v2004-en-20220112
General
-
Target
0e55ead3b8fd305d9a54f78c7b56741a.7z
-
Size
613KB
-
MD5
de849950d1f30e4fd3197a871a2f33dd
-
SHA1
d19e262addf25e440ffb5ea2ea88f44bee546209
-
SHA256
d3722c88f41e2a0a88ee0a6e696df83524662ea0ff5d30f441e05cdc4dbcf9cf
-
SHA512
5786d043caf83c9bceb43aa850dd321adb5493f7aa17b0afaf4d4c1a428457c38226d740fcc930acaf886442139503542452af9320216f4b7fd659ba7e7c6d8b
-
SSDEEP
12288:9RTY8h6udOca76VhoqV4+aQkMKfRcJoRKWfKWKY5L39R7bhdT5GbAXUtHqCg5:jThMuYca7Hj+WMMB/fKWKORpvGUU9qCu
Malware Config
Signatures
Files
-
0e55ead3b8fd305d9a54f78c7b56741a.7z.7z
Password: infected
-
0e55ead3b8fd305d9a54f78c7b56741a.exe windows x86
f8b8e20e844ccd50a8eb73c2fca3626d
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
CloseHandle
LoadLibraryA
VirtualAlloc
GetProcAddress
InitializeCriticalSectionAndSpinCount
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InterlockedCompareExchange
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
InterlockedExchangeAdd
GetModuleHandleW
GetVersion
MultiByteToWideChar
WriteFile
GetFileType
GetStdHandle
GetSystemTimeAsFileTime
DeleteFiber
GetTickCount
QueryPerformanceCounter
GlobalMemoryStatus
WideCharToMultiByte
ConvertFiberToThread
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
GetEnvironmentVariableW
LoadLibraryW
HeapFree
FileTimeToSystemTime
FileTimeToLocalFileTime
GetLastError
DeleteFileA
Sleep
ExitProcess
GetCommandLineA
HeapReAlloc
SetConsoleCtrlHandler
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
GetFullPathNameA
GetCurrentDirectoryA
GetModuleFileNameA
SetHandleCount
GetStartupInfoA
SetFilePointer
ReadFile
RtlUnwind
GetConsoleCP
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
SetLastError
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetModuleHandleA
FlushFileBuffers
SetStdHandle
HeapSize
GetTimeZoneInformation
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CompareStringA
CompareStringW
SetEnvironmentVariableA
CreateFileW
SetEndOfFile
GetProcessHeap
VirtualFree
GetCurrentProcess
FreeLibrary
CreateFileA
FindNextFileA
FindClose
GetLogicalDriveStringsA
FindFirstFileA
lstrcatA
GetFileAttributesA
GetDriveTypeA
GetLogicalDrives
HeapAlloc
lstrcpynA
advapi32
OpenServiceA
CryptDecrypt
CryptCreateHash
CryptSetHashParam
CryptSignHashW
CryptDestroyHash
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptDestroyKey
CryptEnumProvidersW
CryptAcquireContextW
CryptGenRandom
CryptReleaseContext
RegisterEventSourceW
ReportEventW
DeregisterEventSource
CloseServiceHandle
StartServiceCtrlDispatcherA
DeleteService
RegisterServiceCtrlHandlerA
SetServiceStatus
OpenSCManagerA
ws2_32
closesocket
recv
WSASetLastError
send
WSAGetLastError
WSACleanup
user32
GetProcessWindowStation
MessageBoxW
GetUserObjectInformationW
crypt32
CertCloseStore
CertFreeCertificateContext
CertEnumCertificatesInStore
CertFindCertificateInStore
CertOpenStore
CertGetCertificateContextProperty
CertDuplicateCertificateContext
Sections
.text Size: 954KB - Virtual size: 953KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 259KB - Virtual size: 259KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ