Static task
static1
Behavioral task
behavioral1
Sample
001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09.exe
Resource
win10-en-20211208
General
-
Target
6381467847000064.zip
-
Size
178KB
-
MD5
afb63214822e7b85eac2e08fcf97d416
-
SHA1
727411ddd93764629c07890a146b9adffe58b295
-
SHA256
bc35aa01e2f05416bfc38a104cce61fbd45d452ef06e41be65e67165e973614c
-
SHA512
50d12880adc91e60d540f67d79e7f59dd49c6f82a46f66f66cc1b4daf756b69b59d90325889cce2869eaee6a8427ed80fe6395fadf588ad095c7b152c127f6f4
-
SSDEEP
3072:oDQNP8zu9d0gW7FOca5nCjhjllpYiCgMIyNrkLQv8tFsZkafaU2s/5jK:Uq9nwFZa5nINl8IHuIsZlv20jK
Malware Config
Signatures
Files
-
6381467847000064.zip.zip
Password: infected
-
001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09.exe windows x86
bfce8d99da2229492c7de3a8a6087683
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CallNamedPipeW
TerminateProcess
GetExitCodeProcess
DeactivateActCtx
GetVersionExW
SetConsoleCP
GetConsoleAliasesLengthA
GetDefaultCommConfigW
FindFirstFileExW
GetDriveTypeA
FreeEnvironmentStringsA
SetProcessPriorityBoost
SetVolumeMountPointW
GetLongPathNameW
CopyFileA
TlsGetValue
SetConsoleCursorInfo
SetComputerNameExA
SystemTimeToTzSpecificLocalTime
FindAtomA
ReleaseSemaphore
CallNamedPipeA
CreateMailslotA
BuildCommDCBAndTimeoutsW
VirtualProtect
LoadLibraryA
LocalAlloc
TryEnterCriticalSection
GetCommandLineW
InterlockedDecrement
GetCalendarInfoA
DeleteFileA
CreateActCtxW
CreateRemoteThread
SetSystemTimeAdjustment
SetPriorityClass
WritePrivateProfileStringA
GetProcessHeaps
GetProcessHeap
GlobalUnWire
ReadConsoleOutputCharacterW
GetStartupInfoW
GetDiskFreeSpaceExA
GetCPInfoExA
GetWindowsDirectoryW
GetSystemWow64DirectoryW
GetLastError
WriteProfileSectionW
GetProfileStringA
GetConsoleCursorInfo
SetLastError
DeleteVolumeMountPointA
DebugBreak
lstrcmpA
ReadFileScatter
SetConsoleMode
GetVersion
GetSystemWindowsDirectoryW
GlobalFindAtomA
FindCloseChangeNotification
GetTapeParameters
SetMailslotInfo
InterlockedExchange
DefineDosDeviceW
FindVolumeMountPointClose
EndUpdateResourceW
WriteConsoleW
GetSystemTimeAdjustment
WritePrivateProfileSectionA
GetPrivateProfileStructW
GetFileAttributesExA
MoveFileW
GetVolumePathNameA
HeapUnlock
lstrcmpW
SetDefaultCommConfigW
FindActCtxSectionStringA
ResetEvent
GetThreadContext
MoveFileExW
GetProcAddress
GlobalLock
UnregisterWaitEx
BuildCommDCBW
PeekConsoleInputW
GetBinaryTypeW
CreateSemaphoreW
TransmitCommChar
WaitNamedPipeA
GetPrivateProfileSectionNamesW
FindResourceExW
EnumTimeFormatsW
GetLocalTime
CreateSemaphoreA
FreeEnvironmentStringsW
GetPrivateProfileSectionW
GetOverlappedResult
SetFileShortNameW
lstrcpyA
VerLanguageNameW
SetThreadExecutionState
SetSystemTime
LockFile
VerSetConditionMask
GetConsoleAliasA
FlushConsoleInputBuffer
FreeConsole
GetAtomNameW
GetConsoleAliasExesLengthA
WriteConsoleInputW
TransactNamedPipe
EnumDateFormatsA
SetCommState
FileTimeToLocalFileTime
_lopen
GetConsoleAliasExesLengthW
GetWriteWatch
GetModuleHandleW
WriteConsoleOutputCharacterA
GetConsoleMode
HeapFree
OpenMutexA
LocalLock
GetCommMask
SetEndOfFile
FindClose
CreateIoCompletionPort
SetFileApisToANSI
CancelWaitableTimer
GetProcessHandleCount
UnregisterWait
GetConsoleAliasesLengthW
GetProcessVersion
lstrcpynA
SetNamedPipeHandleState
GetCompressedFileSizeA
FindNextVolumeMountPointW
GetFullPathNameA
WriteProfileStringA
DeleteAtom
GlobalAddAtomW
AssignProcessToJobObject
QueryDosDeviceW
InitializeCriticalSection
Process32NextW
SetCurrentDirectoryA
GetBinaryTypeA
MoveFileA
RaiseException
HeapValidate
IsBadReadPtr
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
GetModuleHandleA
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
InterlockedIncrement
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
Sleep
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
GetModuleFileNameA
WriteFile
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
RtlUnwind
InitializeCriticalSectionAndSpinCount
OutputDebugStringA
OutputDebugStringW
LoadLibraryW
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
WideCharToMultiByte
LCMapStringA
LCMapStringW
GetLocaleInfoA
SetFilePointer
GetConsoleCP
FlushFileBuffers
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
CloseHandle
CreateFileA
Sections
.text Size: 250KB - Virtual size: 249KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tutete Size: 512B - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.viyizax Size: 512B - Virtual size: 234B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cesa Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ