Static task
static1
Behavioral task
behavioral1
Sample
6df186c3d5c563f492abed3e125ba4603f726bd1d257d4343f59d1584c0736db.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6df186c3d5c563f492abed3e125ba4603f726bd1d257d4343f59d1584c0736db.exe
Resource
win10v2004-20220812-en
General
-
Target
6df186c3d5c563f492abed3e125ba4603f726bd1d257d4343f59d1584c0736db.zip
-
Size
340KB
-
MD5
399e2cbcf5c1f9b23b95fbcc8eb1ec7a
-
SHA1
bb3dbf4dabba5b0d11e301dc95bec5d28f6f4fd1
-
SHA256
628f52d5db25e701dff7f39e4b49637f92d9d4b17b6014a276896344d7f46d18
-
SHA512
2c14205e5fdc169d2b7b85f39cfdee64b43e662f7d24dfeb8a6c5b4e47309130e270bd4016328693fab16f1779af96d99d312f504916eb2b9def7c5519e7a2f6
-
SSDEEP
6144:XTQUUxQrJXKTo+jyJ6NvGW0szRCosu12pAVA5fLg7LdOlS+J+:MUXr9K/+OzZ2pAqGdAS+J+
Malware Config
Signatures
Files
-
6df186c3d5c563f492abed3e125ba4603f726bd1d257d4343f59d1584c0736db.zip.zip
Password: infected
-
6df186c3d5c563f492abed3e125ba4603f726bd1d257d4343f59d1584c0736db.exe.exe windows x86
Password: infected
e4d0e735c5b80d8efd3c6090a334e0c2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetThreadContext
GetConsoleAliasExesLengthA
OpenJobObjectA
WaitNamedPipeA
AddConsoleAliasW
GetSystemDefaultLCID
GetModuleHandleW
GetTickCount
GetConsoleAliasesA
SetCommState
LoadLibraryW
CopyFileW
GetFileAttributesA
GetFileAttributesW
GetVolumePathNameA
lstrlenW
GetTempPathW
LCMapStringA
GetLastError
GetProcAddress
VirtualAlloc
WriteProfileSectionA
SetComputerNameA
LoadLibraryA
WriteConsoleA
UnhandledExceptionFilter
LocalAlloc
CreateHardLinkW
SetProcessWorkingSetSize
OpenJobObjectW
GetModuleHandleA
CreateMutexA
FindNextFileW
GetFileAttributesExW
AddConsoleAliasA
LCMapStringW
MultiByteToWideChar
Sleep
ExitProcess
GetStartupInfoW
HeapAlloc
HeapFree
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapSize
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
CloseHandle
RaiseException
WriteFile
GetModuleFileNameA
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapReAlloc
WideCharToMultiByte
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CreateFileA
SetFilePointer
GetConsoleCP
GetConsoleMode
SetStdHandle
FlushFileBuffers
SetEndOfFile
GetProcessHeap
ReadFile
GetConsoleOutputCP
WriteConsoleW
shell32
CommandLineToArgvW
Sections
.text Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 306KB - Virtual size: 4.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ