Static task
static1
Behavioral task
behavioral1
Sample
PAYMENT.exe
Resource
win7-20220414-en
General
-
Target
a019d69d5d9c1785aaf4a66574d7bfad67352692f10b1431101a437f1897037a
-
Size
1.2MB
-
MD5
c3a109db61a463afa825ad39607d73a0
-
SHA1
abd7e61611412be7dbd6f038c07051730ef64154
-
SHA256
a019d69d5d9c1785aaf4a66574d7bfad67352692f10b1431101a437f1897037a
-
SHA512
71969965b5aa567d493d176b57ad8ce1ec02a4f55e039a49cf179df577235ae0b3d54215a8d4aab3b29fbde28cd4ffb9105e1851a4211339606a41d3ef1aa71f
-
SSDEEP
6144:+vMB6nojToQzOXrQ87sBC0lAzuhZDaSz2qGbaHtBn:1ccx87sw03vGqGe
Malware Config
Signatures
Files
-
a019d69d5d9c1785aaf4a66574d7bfad67352692f10b1431101a437f1897037a.iso
-
PAYMENT.EXE.exe windows x86
29bc47c0f50f29ca46803ffe9f14ee43
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcr90
_controlfp_s
_invoke_watson
_except_handler4_common
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
__set_app_type
?what@exception@std@@UBEPBDXZ
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
??3@YAXPAX@Z
_crt_debugger_hook
ceil
??1exception@std@@UAE@XZ
??_V@YAXPAX@Z
??0exception@std@@QAE@ABV01@@Z
fclose
fwrite
fread
scanf
vsprintf
sprintf
__FrameUnwindFilter
abort
??2@YAPAXI@Z
_encoded_null
kernel32
GetCurrentProcess
Sleep
InterlockedCompareExchange
GetStartupInfoW
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetFileType
GetProcessId
VirtualAlloc
GetModuleHandleW
TerminateThread
ExitThread
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
InterlockedExchange
msvcp90
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$allocator@_W@std@@QAE@ABV01@@Z
?_Decref@facet@locale@std@@QAEPAV123@XZ
?_Lockit_dtor@_Lockit@std@@SAXH@Z
?_Lockit_ctor@_Lockit@std@@SAXH@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
msvcm90
?RegisterModuleUninitializer@<CrtImplementationDetails>@@YAXP$AAVEventHandler@System@@@Z
?DoDllLanguageSupportValidation@<CrtImplementationDetails>@@YAXXZ
?ThrowModuleLoadException@<CrtImplementationDetails>@@YAXP$AAVString@System@@P$AAVException@3@@Z
?ThrowModuleLoadException@<CrtImplementationDetails>@@YAXP$AAVString@System@@@Z
?ThrowNestedModuleLoadException@<CrtImplementationDetails>@@YAXP$AAVException@System@@0@Z
?DoCallBackInDefaultDomain@<CrtImplementationDetails>@@YAXP6GJPAX@Z0@Z
mscoree
_CorExeMain
Sections
.text Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 171KB - Virtual size: 229KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kupajis Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ