Static task
static1
Behavioral task
behavioral1
Sample
1bc6dc2bd7d420c49f410a30bbcf786a7c68a7e324145487edfc8dfb324c6473.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
1bc6dc2bd7d420c49f410a30bbcf786a7c68a7e324145487edfc8dfb324c6473.exe
Resource
win10v2004-en-20220112
General
-
Target
1bc6dc2bd7d420c49f410a30bbcf786a7c68a7e324145487edfc8dfb324c6473.zip
-
Size
231KB
-
MD5
0b5a99e6c739dc01feaf13aac70c6eac
-
SHA1
e6e31b72fdeedd59af8d24afd4af6dd2c53f8110
-
SHA256
60a4c4bd4123ceeaa0e9806aa63dceb164091583112ba166d7708335f35edb8c
-
SHA512
24ed28f6a23a271ac009f6c546c30ec61f106c935a59318315cfcbd983ada823545d08d96c69c77211e460cdcede03de6de88e0a67a3f1fc0c4934182e1ca591
-
SSDEEP
6144:2exDOtsY6CAVAWRt/D4b9qGt7qsHuR1mj4qWqwEj:VxDCsHvuWwb9q27qOu+e/O
Malware Config
Signatures
Files
-
1bc6dc2bd7d420c49f410a30bbcf786a7c68a7e324145487edfc8dfb324c6473.zip.zip
Password: infected
-
1bc6dc2bd7d420c49f410a30bbcf786a7c68a7e324145487edfc8dfb324c6473.exe windows x86
059e939bc149cd78a08e6bfa706a4e4a
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FileTimeToDosDateTime
TerminateProcess
ZombifyActCtx
GetConsoleAliasesLengthW
GetVersionExW
GetConsoleOutputCP
GetDefaultCommConfigW
SetCommConfig
GetDriveTypeA
FreeEnvironmentStringsW
CreateTimerQueue
FindNextVolumeW
InitializeCriticalSectionAndSpinCount
ReadConsoleInputW
TlsGetValue
SetComputerNameExW
FindAtomW
BuildCommDCBAndTimeoutsA
LoadLibraryA
GlobalAlloc
InitializeCriticalSection
GetCommandLineA
InterlockedIncrement
CopyFileA
OutputDebugStringW
FormatMessageA
GetPriorityClass
WritePrivateProfileStringA
ExitThread
GlobalUnfix
HeapCompact
GetStartupInfoW
CreatePipe
GetCPInfoExA
GetWindowsDirectoryW
GetSystemWow64DirectoryA
SetLastError
WriteProfileSectionW
GetCalendarInfoW
ResumeThread
SetConsoleCursorInfo
GetLastError
DebugActiveProcess
lstrcmpA
WriteFile
GetNumberOfConsoleInputEvents
GetProcAddress
GetSystemWindowsDirectoryW
FindNextChangeNotification
CreateActCtxA
GetPrivateProfileIntW
_lread
InterlockedDecrement
DefineDosDeviceA
SetVolumeMountPointA
EndUpdateResourceW
WriteConsoleA
VirtualProtect
InterlockedPushEntrySList
DeleteCriticalSection
GetFileAttributesExW
FileTimeToSystemTime
GetVolumePathNameA
GetConsoleMode
HeapSetInformation
FindActCtxSectionStringA
WriteProcessMemory
MoveFileExA
DisableThreadLibraryCalls
GlobalCompact
UnregisterWait
DeleteAtom
FatalExit
InterlockedCompareExchange
WaitNamedPipeW
FindResourceExA
EnumDateFormatsA
GetSystemTime
GetSystemInfo
EnumCalendarInfoExW
GetPrivateProfileStructA
OpenSemaphoreA
GetMailslotInfo
lstrcpyA
VerLanguageNameA
SetThreadExecutionState
SetSystemTime
GetFileInformationByHandle
GetConsoleCP
GetConsoleAliasA
GetLargestConsoleWindowSize
CreateMailslotA
EnumDateFormatsW
SetCommState
LockFile
_lopen
GetConsoleAliasExesLengthW
ResetWriteWatch
CreateConsoleScreenBuffer
ClearCommBreak
ChangeTimerQueueTimer
GetOverlappedResult
WriteConsoleInputW
HeapSize
GetConsoleDisplayMode
GetStringTypeA
SetFilePointer
PostQueuedCompletionStatus
SetFileApisToOEM
OpenWaitableTimerW
GetProcessId
PeekNamedPipe
FillConsoleOutputCharacterW
FindNextVolumeMountPointA
WriteProfileStringA
GlobalAddAtomA
WriteConsoleOutputCharacterW
TerminateJobObject
QueryDosDeviceA
VirtualAlloc
GetBinaryTypeA
InitAtomTable
LeaveCriticalSection
CreateFileA
MoveFileA
RaiseException
HeapValidate
IsBadReadPtr
EnterCriticalSection
GetModuleFileNameW
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
Sleep
ExitProcess
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
GetCommandLineW
HeapDestroy
HeapCreate
HeapFree
VirtualFree
GetModuleFileNameA
HeapAlloc
HeapReAlloc
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
RtlUnwind
DebugBreak
OutputDebugStringA
WriteConsoleW
LoadLibraryW
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeW
GetLocaleInfoA
FlushFileBuffers
SetStdHandle
CloseHandle
user32
OemToCharA
winhttp
WinHttpReadData
Sections
.text Size: 156KB - Virtual size: 156KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 66KB - Virtual size: 219KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tiriwir Size: 512B - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ