Static task
static1
Behavioral task
behavioral1
Sample
6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe
Resource
win10v2004-20220812-en
General
-
Target
6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.7z
-
Size
341KB
-
MD5
0b8b52ccdcad80f2bd9f3ac1088bf9c4
-
SHA1
a1b35bc12d60e6c3eb00dd1174e47b6046a3e72a
-
SHA256
df480deb191b335dcbc3d4fc5d59594cb38caee2aaef8d877fbbc573de741301
-
SHA512
0147f02113c6ad29955727f873e2b6206dbbcbf0c129b624ae7b36c340e04288b7547034bc06261b18f123a47b4d575929bb92d618c46d4dd6d5420d2b4ae5e4
-
SSDEEP
6144:fs7Kf3dQexXASk6/fnmX70P6dmVPWd2pb6k3epZv3qCFjh72V/fSeWNhDmuqH/O8:f+iNQexQonmwiUCIkfSwyI0u8/OcLhP
Malware Config
Signatures
Files
-
6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.7z.7z
Password: infected
-
6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe windows x86
84b1545132d61f3a64491b0ab3c2d10c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResetEvent
CreateIoCompletionPort
FormatMessageA
GetConsoleWindow
CopyFileW
ExitProcess
CloseHandle
GlobalAlloc
LoadLibraryA
GetLastError
Sleep
LoadLibraryW
PostQueuedCompletionStatus
GetFileAttributesW
CreateMutexA
GetQueuedCompletionStatus
SetThreadPriority
GetFileSizeEx
InitializeSListHead
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
MultiByteToWideChar
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
DeleteCriticalSection
WideCharToMultiByte
WaitForSingleObjectEx
SwitchToThread
GetExitCodeThread
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
GetProcAddress
QueryPerformanceFrequency
GetCPInfo
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCurrentThread
GetThreadTimes
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
RaiseException
FreeLibrary
LoadLibraryExW
GetModuleHandleExW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleFileNameW
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
HeapFree
HeapAlloc
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
HeapReAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
SetStdHandle
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadFile
SetFilePointerEx
ReadConsoleW
GetTimeZoneInformation
HeapSize
CreateFileW
WriteConsoleW
CreateTimerQueue
SetEvent
SignalObjectAndWait
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetModuleHandleA
GetVersionExW
VirtualAlloc
VirtualProtect
VirtualFree
DuplicateHandle
ReleaseSemaphore
InterlockedPopEntrySList
QueryDepthSList
UnregisterWaitEx
advapi32
CryptImportKey
CryptGenRandom
CryptAcquireContextA
CryptDestroyKey
CryptEncrypt
CryptReleaseContext
user32
ShutdownBlockReasonCreate
ShowWindow
crypt32
CryptBinaryToStringA
CryptDecodeObjectEx
CryptImportPublicKeyInfo
CryptStringToBinaryA
Sections
.text Size: 707KB - Virtual size: 707KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 148KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ