Static task
static1
Behavioral task
behavioral1
Sample
02a08b994265901a649f1bcf6772bc06df2eb51eb09906af9fd0f4a8103e9851.exe
Resource
win10-20220812-en
General
-
Target
02a08b994265901a649f1bcf6772bc06df2eb51eb09906af9fd0f4a8103e9851 (1).7z
-
Size
66KB
-
MD5
95da6fcf5d498b207a761e578cc80f60
-
SHA1
0f75a68c13ba3b0ff7d72540a2f174f7d6e0220a
-
SHA256
db2316e82edf18eba5ff4f684e13f68e60cd7d2a285b8c477da3f530d64ed66c
-
SHA512
c87e6cdd4fb71478be06af3140ea45485b9598a66d0c08b802de185670ba8497e4882cd52a5ad5ad0cdef2636a1c8a6aa9d50b4f98e4ad5c10411aa498664b56
-
SSDEEP
1536:HA4i1v8brQ2IM34XT2jDcV4hYj6qC7XmkpReI:HAr1v4Q14O2oGJTZd
Malware Config
Signatures
Files
-
02a08b994265901a649f1bcf6772bc06df2eb51eb09906af9fd0f4a8103e9851 (1).7z.7z
Password: infected
-
02a08b994265901a649f1bcf6772bc06df2eb51eb09906af9fd0f4a8103e9851.exe windows x86
593b61df0f3b8d68fe1726159597097d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnterCriticalSection
GetCommandLineW
FindNextFileW
GetCurrentProcess
lstrlenW
WriteFile
InterlockedDecrement
WaitForMultipleObjects
LeaveCriticalSection
InitializeCriticalSection
SetErrorMode
GetQueuedCompletionStatus
FindClose
CreateFileW
ResumeThread
lstrcatA
GetModuleHandleA
PostQueuedCompletionStatus
SetFileAttributesW
Sleep
GetLastError
InterlockedExchangeAdd
CloseHandle
HeapFree
LoadLibraryW
CreateThread
HeapAlloc
GetProcAddress
LocalFree
DeleteCriticalSection
ExitProcess
GetProcessHeap
SystemTimeToFileTime
InterlockedIncrement
GetSystemTime
lstrcmpiW
CreateIoCompletionPort
GetTickCount
lstrcmpW
MoveFileW
GetDriveTypeW
QueryPerformanceCounter
HeapReAlloc
HeapSize
WriteConsoleW
GetFileSizeEx
FindFirstFileW
CancelIo
GetLogicalDrives
GetSystemInfo
ReadFile
FlushFileBuffers
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
DecodePointer
FindNextFileA
FindFirstFileExA
GetConsoleCP
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
TerminateProcess
RtlUnwind
RaiseException
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
EncodePointer
GetModuleHandleExW
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
GetStdHandle
GetACP
SetFilePointerEx
GetConsoleMode
GetFileType
LCMapStringW
user32
CharLowerW
wsprintfW
advapi32
CryptGenRandom
CryptReleaseContext
OpenProcessToken
SetThreadToken
GetTokenInformation
CryptAcquireContextW
shell32
SHEmptyRecycleBinA
CommandLineToArgvW
ole32
CoCreateInstance
CoSetProxyBlanket
CoInitialize
oleaut32
VariantClear
SysAllocString
VariantInit
SysFreeString
shlwapi
StrStrW
wnsprintfA
mpr
WNetEnumResourceW
WNetCloseEnum
WNetOpenEnumW
Sections
.text Size: 91KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ