Static task
static1
Behavioral task
behavioral1
Sample
avolkovModified.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
avolkovModified.exe
Resource
win10v2004-20220812-en
General
-
Target
avolkovModified.7z
-
Size
1.1MB
-
MD5
66d324434e1f6f5f26708d5b209ea1d1
-
SHA1
014c30f33a739a102b51078f50f667a281dd83e4
-
SHA256
ab28a9c8a0068af34ba9ffb88a2ce398cf7f2d9834d63bf9bdcf549a8a030e5c
-
SHA512
8cdcea4506f0910ead51b8e6b341d849babb7fa96b501473e9024225a1283da7e24f9b3f794822dea9df5703dd773951a2c54377783b27836b090a0dbfb452bc
-
SSDEEP
24576:CVrTB5MZYg7N7sZ8wNoYcH+9j/TsOyLdECHU3s5qWWOxYfGV0yzBZd4jDe65:ChTBiYQKZ8wNFvdBtg7K1WZOjDP5
Malware Config
Signatures
Files
-
avolkovModified.7z.7z
Password: infected
-
avolkovModified.exe.exe windows x64
ba24d38ccb5e545306440d0d4d70e28c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
bcrypt
BCryptGenRandom
kernel32
WaitForSingleObjectEx
CompareFileTime
GetSystemTimeAsFileTime
GetEnvironmentVariableA
GetStdHandle
GetFileType
ReadFile
PeekNamedPipe
WaitForMultipleObjects
VerSetConditionMask
VerifyVersionInfoW
RtlCaptureContext
MoveFileExA
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
WideCharToMultiByte
MultiByteToWideChar
FormatMessageW
SetLastError
Sleep
GetTickCount
QueryPerformanceCounter
CloseHandle
LoadLibraryA
GetProcAddress
GetModuleHandleA
FreeLibrary
GetSystemDirectoryA
QueryPerformanceFrequency
SleepEx
DeleteCriticalSection
InitializeCriticalSectionEx
LeaveCriticalSection
EnterCriticalSection
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
CreateProcessA
GetLastError
WaitForSingleObject
RtlUnwind
RtlLookupFunctionEntry
SystemTimeToFileTime
GetSystemTime
FindFirstFileW
LoadLibraryW
ConvertThreadToFiber
ConvertFiberToThread
CreateFiber
DeleteFiber
SwitchToFiber
ReadConsoleA
SetConsoleMode
GetEnvironmentVariableW
WriteConsoleW
HeapSize
GetTimeZoneInformation
DeleteFileW
SetConsoleCtrlHandler
GetProcessHeap
GetStringTypeW
RtlUnwindEx
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetEnvironmentVariableW
EncodePointer
RaiseException
RtlPcToFileHeader
CreateFileW
GetDriveTypeW
GetFileInformationByHandle
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
SetFilePointerEx
WriteFile
GetModuleFileNameW
ExitProcess
GetConsoleMode
ReadConsoleW
GetConsoleOutputCP
HeapFree
GetFileSizeEx
HeapAlloc
HeapReAlloc
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
FlushFileBuffers
GetFileAttributesExW
SetStdHandle
SetEndOfFile
GetCurrentDirectoryW
GetFullPathNameW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
LoadLibraryExW
crypt32
CertOpenStore
CertFindCertificateInStore
CertOpenSystemStoreA
CertGetIntendedKeyUsage
CertGetEnhancedKeyUsage
CertFreeCertificateContext
CertEnumCertificatesInStore
CertCloseStore
CertDuplicateCertificateContext
CertGetCertificateContextProperty
ws2_32
freeaddrinfo
getaddrinfo
listen
htonl
accept
select
__WSAFDIsSet
WSACleanup
WSAStartup
inet_pton
WSAIoctl
WSASetLastError
socket
setsockopt
sendto
ioctlsocket
gethostname
recvfrom
ntohs
htons
getsockopt
getsockname
getpeername
connect
bind
recv
WSAGetLastError
closesocket
WSAWaitForMultipleEvents
WSAResetEvent
WSAEventSelect
WSAEnumNetworkEvents
WSACreateEvent
WSACloseEvent
send
getnameinfo
shutdown
user32
MessageBoxW
GetUserObjectInformationW
GetProcessWindowStation
advapi32
DeregisterEventSource
RegisterEventSourceW
ReportEventW
CryptAcquireContextW
CryptReleaseContext
CryptDestroyKey
CryptSetHashParam
CryptGetProvParam
CryptGetUserKey
CryptExportKey
CryptDecrypt
CryptCreateHash
CryptDestroyHash
CryptSignHashW
CryptEnumProvidersW
Sections
.text Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 659KB - Virtual size: 658KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 900.0MB - Virtual size: 900.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ