Static task
static1
Behavioral task
behavioral1
Sample
bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0.exe
Resource
win7-20220812-en
General
-
Target
bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0.zip
-
Size
205KB
-
MD5
617485a3774e52df5d87710c37632d06
-
SHA1
8951d1178798e85bc23e38a56675c45a7c2202d5
-
SHA256
4e559c0d675abe7fa177e3aaa267e83f52675fdf9599112926c2a57d46e05202
-
SHA512
5dc498aa1d493f44492c5cb1d2351514a5f0af0460a70c7609bc74e281d9750abce9671a13d5f1b901d237b89502849b6a8bd4e591253a1079d42cf01fcd6984
-
SSDEEP
6144:jhBQo3ctY+1Mcg9PMFl41/f5/2AQb6eDAv6dfLxvhn:jvQcKYggpMFl41/fYz3ddDpV
Malware Config
Signatures
Files
-
bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0.zip.zip
Password: threatbook
-
bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0.exe windows x86
Password: threatbook
15145246279dbac9c0f3d99a59f6d9e1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
QueryDosDeviceA
LocalFree
SetProcessPriorityBoost
VirtualQuery
GlobalGetAtomNameW
FindResourceA
GetComputerNameExW
GetModuleHandleA
GetTempPathA
BuildCommDCBAndTimeoutsW
GetProcAddress
VirtualProtect
OpenJobObjectW
_lwrite
UnlockFile
GetPrivateProfileStructA
GetDiskFreeSpaceExW
DefineDosDeviceA
SetVolumeMountPointW
GetAtomNameA
FlushConsoleInputBuffer
EnumResourceLanguagesA
GetCPInfoExW
GetThreadContext
lstrlenW
GetProcessAffinityMask
SetConsoleWindowInfo
CreateJobSet
CopyFileW
lstrcpynA
WriteConsoleA
GetCommandLineA
GetLastError
GetCommandLineW
InterlockedIncrement
FormatMessageW
CreateJobObjectW
InitializeCriticalSection
FindNextVolumeA
SetConsoleCursorInfo
LoadLibraryW
VerifyVersionInfoA
AddAtomW
InterlockedDecrement
LoadLibraryA
FoldStringA
GetDefaultCommConfigW
GetConsoleAliasesLengthW
lstrcpyA
TerminateThread
HeapFree
SetCriticalSectionSpinCount
GetComputerNameA
EnumSystemLocalesW
DisableThreadLibraryCalls
OpenMutexA
LocalFileTimeToFileTime
SearchPathA
SetProcessShutdownParameters
CreateMutexA
FormatMessageA
InterlockedCompareExchange
EnumDateFormatsW
GetConsoleScreenBufferInfo
LocalAlloc
SetFileShortNameA
EnumCalendarInfoExW
GetFileAttributesA
GetSystemWindowsDirectoryA
GetAtomNameW
ReadConsoleInputA
EnumDateFormatsA
_hwrite
GetConsoleAliasA
GetQueuedCompletionStatus
lstrcatW
GetDefaultCommConfigA
GetFullPathNameW
DebugBreakProcess
AddAtomA
SetCurrentDirectoryW
SetCalendarInfoW
GetProfileSectionW
FindNextFileA
SetHandleCount
MoveFileWithProgressW
ReadConsoleOutputCharacterW
CopyFileExW
WriteProfileSectionW
GetModuleHandleW
Sleep
ExitProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
MoveFileA
DeleteFileA
RaiseException
GetStartupInfoA
HeapValidate
IsBadReadPtr
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
GetModuleFileNameA
WriteFile
GetStdHandle
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
RtlUnwind
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadFile
SetFilePointer
CloseHandle
SetStdHandle
GetConsoleOutputCP
CreateFileA
gdi32
GetCharWidth32A
GetBoundsRect
GetCharWidthW
SelectObject
advapi32
RevertToSelf
Sections
.text Size: 196KB - Virtual size: 196KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 128KB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ