Static task
static1
Behavioral task
behavioral1
Sample
6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe
Resource
win10v2004-20220812-en
General
-
Target
6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.zip
-
Size
410KB
-
MD5
b9a77d7a2066ed2f57268834846e763b
-
SHA1
a2b16ac1b3a164808b9629980a7d6d71d96a5513
-
SHA256
fe23d4b7a9db3c937523afecdbe14969987c27f35b9bb9c90f656bcd897bcb87
-
SHA512
4054cc84cf2906c8543c6631d1054894fadcd8c9ef1537df9b09ee09876458dbcfa2529d5371c5aea61ffa1ece0f5ef00d487767f63b2d31cfb77e7e043ecad7
-
SSDEEP
6144:Rp6kVHYlu0jeRGChrOEKHebiT9QTZ2SScS1cBrnT55jr+Zke0lqXzT4:D6kV2NsOFRQlY71arnfj6ZR0l+4
Malware Config
Signatures
Files
-
6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.zip.zip
Password: infected
-
6cc510a772d7718c95216eb56a84a96201241b264755f28875e685f06e95e1a2.exe windows x86
84b1545132d61f3a64491b0ab3c2d10c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResetEvent
CreateIoCompletionPort
FormatMessageA
GetConsoleWindow
CopyFileW
ExitProcess
CloseHandle
GlobalAlloc
LoadLibraryA
GetLastError
Sleep
LoadLibraryW
PostQueuedCompletionStatus
GetFileAttributesW
CreateMutexA
GetQueuedCompletionStatus
SetThreadPriority
GetFileSizeEx
InitializeSListHead
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
MultiByteToWideChar
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
DeleteCriticalSection
WideCharToMultiByte
WaitForSingleObjectEx
SwitchToThread
GetExitCodeThread
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
GetProcAddress
QueryPerformanceFrequency
GetCPInfo
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCurrentThread
GetThreadTimes
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
RaiseException
FreeLibrary
LoadLibraryExW
GetModuleHandleExW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleFileNameW
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
HeapFree
HeapAlloc
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
HeapReAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
SetStdHandle
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadFile
SetFilePointerEx
ReadConsoleW
GetTimeZoneInformation
HeapSize
CreateFileW
WriteConsoleW
CreateTimerQueue
SetEvent
SignalObjectAndWait
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetModuleHandleA
GetVersionExW
VirtualAlloc
VirtualProtect
VirtualFree
DuplicateHandle
ReleaseSemaphore
InterlockedPopEntrySList
QueryDepthSList
UnregisterWaitEx
advapi32
CryptImportKey
CryptGenRandom
CryptAcquireContextA
CryptDestroyKey
CryptEncrypt
CryptReleaseContext
user32
ShutdownBlockReasonCreate
ShowWindow
crypt32
CryptBinaryToStringA
CryptDecodeObjectEx
CryptImportPublicKeyInfo
CryptStringToBinaryA
Sections
.text Size: 707KB - Virtual size: 707KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 148KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ