Static task
static1
Behavioral task
behavioral1
Sample
a17598d190c79ff3c597428da79e97a25cdef95579bce5376802f7272eace783.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a17598d190c79ff3c597428da79e97a25cdef95579bce5376802f7272eace783.exe
Resource
win10v2004-20220901-en
General
-
Target
a17598d190c79ff3c597428da79e97a25cdef95579bce5376802f7272eace783.zip
-
Size
258KB
-
MD5
18f942ff38e6aedbdc15793543d90276
-
SHA1
83806b4446d20a280f9eb3b5781926e7b620877e
-
SHA256
585ef98b83898f1322144680354fe305d3f123ff55db98ca82e4bcd2498eaf17
-
SHA512
ba37cbebb3a538f121b007629f8d7a445d4e8271ce18ee7a5df271ff089f6e87bcb5e210a3fb3d4e9850eee3cca859b672e07ec61fcbe7c1bcba61a3fc4d5ebf
-
SSDEEP
3072:piKmxOA9jZXNMBbvjO3mngi51qJFTfUuzYzPuW95/jaxQYsJ8IiMLKTemOuQ2yWG:iVpMBbG81KfhzEmW95exmJYyK99Ct
Malware Config
Signatures
Files
-
a17598d190c79ff3c597428da79e97a25cdef95579bce5376802f7272eace783.zip.zip
Password: infected
-
a17598d190c79ff3c597428da79e97a25cdef95579bce5376802f7272eace783.exe windows x64
4a6cb5107622ccebae6031e10286997f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
ClearEventLogA
ImpersonateLoggedOnUser
ImpersonateNamedPipeClient
ReadEventLogA
RegCloseKey
RegFlushKey
kernel32
CloseHandle
CreateFileA
CreatePipe
CreateProcessA
DeleteCriticalSection
DeleteFileA
EnterCriticalSection
FindClose
FlushConsoleInputBuffer
GetCommModemStatus
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetExitCodeProcess
GetFileType
GetHandleInformation
GetLastError
GetProcAddress
GetStartupInfoA
GetSystemTimeAsFileTime
GetTempFileNameA
GetTempPathA
GetTickCount
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
OpenEventA
QueryPerformanceCounter
ReadConsoleW
ReadFile
ReplaceFileA
RtlAddFunctionTable
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
SetConsoleMode
SetCurrentDirectoryA
SetEvent
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
WaitForSingleObject
msvcrt
__C_specific_handler
__getmainargs
__initenv
__iob_func
__lconv_init
__set_app_type
__setusermatherr
_acmdln
_amsg_exit
_cexit
_fmode
_initterm
_onexit
_snprintf
abort
calloc
exit
fprintf
free
fwrite
malloc
memcpy
signal
strlen
strncmp
vfprintf
Sections
.text Size: 106KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 628KB - Virtual size: 628KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 1024B - Virtual size: 744B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 1024B - Virtual size: 736B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 104B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE