Static task
static1
Behavioral task
behavioral1
Sample
14f736b7df6a35c29eaed82a47fc0a248684960aa8f2222b5ab8cdad28ead745.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
14f736b7df6a35c29eaed82a47fc0a248684960aa8f2222b5ab8cdad28ead745.exe
Resource
win10v2004-20220812-en
General
-
Target
14f736b7df6a35c29eaed82a47fc0a248684960aa8f2222b5ab8cdad28ead745.zip
-
Size
1.6MB
-
MD5
8261766f0a959adda359e0e3cda6013f
-
SHA1
823ebe1a86584d9f40ab718d18bbbb2d58a9605f
-
SHA256
3f088863996da09068997b8493094a432fcceeaa72afa64ca8e6d671cf575236
-
SHA512
10570c1a6ed01b0f8278254c4912097e2ea517c0d05d4562d8afa9630ac2684602466aff74253d2a3c62a3824178b895753f06e204bd78ad0bdbde605b755716
-
SSDEEP
24576:suhLmmK6rvGIxNoepe8RHC1B7VBECXHBKyVsU7s/2C7prHMfYwUYMSFsoR2TpJuQ:1hLVJvhr01BJtHOUI/KuYMHLu8i6
Malware Config
Signatures
Files
-
14f736b7df6a35c29eaed82a47fc0a248684960aa8f2222b5ab8cdad28ead745.zip.zip
Password: infected
-
14f736b7df6a35c29eaed82a47fc0a248684960aa8f2222b5ab8cdad28ead745.exe windows x64
Password: infected
4abedc803df9a7de75361e0469ec3efe
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
comctl32
InitCommonControlsEx
ImageList_Destroy
ImageList_Create
ImageList_ReplaceIcon
CreateToolbarEx
kernel32
SetFilePointer
WriteConsoleW
GetModuleHandleW
GetComputerNameA
ReadFile
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
GetConsoleCP
HeapSize
SetStdHandle
GetProcessHeap
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetFileType
HeapFree
HeapReAlloc
VirtualAlloc
GetFileSizeEx
WritePrivateProfileStringW
GetPrivateProfileIntW
GetPrivateProfileStringW
CreateDirectoryW
FindFirstFileW
FindNextFileW
RemoveDirectoryW
SetFileTime
SetErrorMode
FindClose
CreateFileW
GetLogicalDriveStringsW
DeleteFileW
CloseHandle
MoveFileW
GetCurrentThreadId
GetCurrentProcessId
FormatMessageW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
WaitForSingleObject
ResumeThread
Sleep
CreateThread
MultiByteToWideChar
WideCharToMultiByte
FileTimeToSystemTime
FileTimeToLocalFileTime
GetLocalTime
GetTimeFormatW
SystemTimeToFileTime
GetDateFormatW
FreeResource
LockResource
LoadResource
FindResourceW
GetCurrentProcess
GetModuleFileNameW
GetLastError
TerminateProcess
CreateEventW
SetEvent
CreateProcessW
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
GetCommandLineW
GetProcAddress
FreeLibrary
LocalFree
ResetEvent
WaitForSingleObjectEx
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
RtlPcToFileHeader
RaiseException
RtlUnwindEx
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetStdHandle
WriteFile
GetACP
HeapAlloc
user32
GetDlgItem
MessageBoxW
GetCursorPos
SetForegroundWindow
RegisterWindowMessageW
TrackPopupMenu
IsWindowVisible
MapVirtualKeyW
DestroyIcon
GetWindowLongPtrW
GetSystemMetrics
SendMessageW
CallWindowProcW
PostMessageW
ShowWindow
GetActiveWindow
GetWindowRect
GetWindowTextW
InvalidateRect
SetWindowLongW
SetWindowTextW
GetWindowLongW
DialogBoxParamW
LoadIconW
IsWindow
SetClassLongPtrW
EndDialog
DestroyWindow
CreateDialogParamW
EnableMenuItem
AppendMenuW
CheckMenuItem
DestroyMenu
SetMenuDefaultItem
CreatePopupMenu
GetMenuItemCount
InsertMenuItemW
GetMenuItemID
GetSystemMenu
CreateWindowExW
FillRect
ShowScrollBar
SetScrollInfo
EndPaint
BeginPaint
GetClientRect
ScreenToClient
GetParent
LoadBitmapW
ReleaseDC
GetDC
ToUnicodeEx
GetKeyboardLayout
GetAsyncKeyState
GetKeyState
LoadAcceleratorsW
SetClipboardData
GetClipboardData
EmptyClipboard
CloseClipboard
OpenClipboard
GetPriorityClipboardFormat
SetClipboardViewer
PostQuitMessage
IsDialogMessageW
SystemParametersInfoW
SetWindowsHookExW
UnhookWindowsHookEx
CallNextHookEx
SetWindowPos
MonitorFromWindow
MessageBeep
GetWindowPlacement
GetMonitorInfoW
GetKeyboardLayoutNameW
SetWindowPlacement
SetFocus
LoadCursorW
KillTimer
GetDesktopWindow
IsIconic
GetMessageW
DefWindowProcW
SetWindowLongPtrW
UnregisterClassW
DispatchMessageW
SetTimer
RegisterClassW
TranslateAcceleratorW
TranslateMessage
GetSysColorBrush
EnableWindow
comdlg32
GetSaveFileNameW
advapi32
RegCreateKeyW
RegSetValueExW
RegDeleteKeyW
GetUserNameA
RegEnumKeyW
RegQueryValueExW
RegOpenKeyW
RegDeleteValueW
RegCloseKey
ws2_32
inet_addr
select
closesocket
WSAStartup
WSACleanup
setsockopt
send
getsockname
getpeername
listen
shutdown
bind
accept
__WSAFDIsSet
socket
connect
htons
recv
htonl
ntohs
ntohl
gethostbyname
WSAGetLastError
ioctlsocket
gdi32
GetDIBits
GetCurrentObject
CreateDIBSection
StretchBlt
SetStretchBltMode
SelectObject
CreateCompatibleDC
DeleteDC
GetObjectW
CreateSolidBrush
BitBlt
DeleteObject
shell32
SHGetSpecialFolderPathW
ShellExecuteW
CommandLineToArgvW
Shell_NotifyIconW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
Sections
.text Size: 666KB - Virtual size: 665KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 287KB - Virtual size: 287KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 1024B - Virtual size: 572B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ