Static task
static1
Behavioral task
behavioral1
Sample
a3ef9fd758bca1c94054a43995a99069abaef672495c1bd3ee831217c1f5e498.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a3ef9fd758bca1c94054a43995a99069abaef672495c1bd3ee831217c1f5e498.exe
Resource
win10v2004-20220812-en
General
-
Target
a3ef9fd758bca1c94054a43995a99069abaef672495c1bd3ee831217c1f5e498.zip
-
Size
75KB
-
MD5
3b59b038f955eee3435abe89ff123a69
-
SHA1
c01e235c381d26304a3a0554d0a3c90874e8a644
-
SHA256
e7970778513df4a3c5ad8476ad3a00e0062a7413452c6780fa6d4fc5d90d0cc5
-
SHA512
dee24052ef6ec3d91170956a07172cb1355c1d96ba472a2cb8aeb96847d49a0c5b9e42767d3df5f7e5edcec65c61537ea62e3486b9ce2362fa4535590d49721a
-
SSDEEP
1536:n5O+JUFFG/NOOD1/i6hiMRvMlCcx0Uupz+cS4IXNjkdChaGfq5FDrMpW:5OvF2OOD1/i6hCxBp4IOVGfmaW
Malware Config
Signatures
Files
-
a3ef9fd758bca1c94054a43995a99069abaef672495c1bd3ee831217c1f5e498.zip.zip
Password: infected
-
a3ef9fd758bca1c94054a43995a99069abaef672495c1bd3ee831217c1f5e498.bin.exe windows x64
5c68e273ec2d546445709826ace13623
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
VirtualProtect
HeapFree
SetLastError
VirtualFree
VirtualAlloc
GetModuleHandleA
GetProcAddress
GetProcessHeap
FreeLibrary
GlobalReAlloc
GetModuleFileNameW
WaitForSingleObject
Sleep
DeleteFileW
CloseHandle
CreateProcessW
CopyFileW
WriteConsoleW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetTickCount
DeleteCriticalSection
RaiseException
GlobalFree
GlobalAlloc
GetLastError
IsBadReadPtr
InitializeCriticalSectionEx
FlushFileBuffers
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlPcToFileHeader
RtlUnwindEx
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
GetStdHandle
WriteFile
GetACP
HeapAlloc
GetFileType
LCMapStringW
GetStringTypeW
HeapReAlloc
HeapSize
FindClose
FindFirstFileExA
FindNextFileA
CreateFileW
user32
wsprintfA
wsprintfW
advapi32
CryptAcquireContextW
CryptEncrypt
CryptCreateHash
CryptDeriveKey
CryptHashData
CryptDestroyHash
CryptReleaseContext
CryptDestroyKey
shell32
ShellExecuteA
SHGetKnownFolderPath
ole32
CoCreateInstance
CoInitializeEx
CoTaskMemFree
CoUninitialize
wininet
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetReadFile
InternetAttemptConnect
secur32
GetUserNameExA
Sections
.text Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 168B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ