Static task
static1
Behavioral task
behavioral1
Sample
1339d8437b13ceca77e24912f9c3fe11e30b32f71bc7da03c4f86a4c8a218453.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1339d8437b13ceca77e24912f9c3fe11e30b32f71bc7da03c4f86a4c8a218453.exe
Resource
win10v2004-20221111-en
General
-
Target
1339d8437b13ceca77e24912f9c3fe11e30b32f71bc7da03c4f86a4c8a218453.zip
-
Size
111KB
-
MD5
9767a3bddbccfa31b1cd86da1de883f2
-
SHA1
5a0d8b75ca0b9817a6181ca9380ec8c80f719922
-
SHA256
b979759d2943254bd29d04aec2c0d7ce655b28101a303d961e96fcd6efe3a600
-
SHA512
72d4ac094296ff4fbf5a0434c685a7779beea5636c5a01a24791c986677009a3dd34b2adde76bf3e33e68b1c83795d5b3fa900accfa18e15cd64a56b480e8461
-
SSDEEP
3072:89NmVWJjMOJ6QncTa1NoM91JdkEdcRMdVXfPtK8XRswHlQOqx5FO:8OVPod+0NoMDnNVd1PY8XOwHCOQs
Malware Config
Signatures
Files
-
1339d8437b13ceca77e24912f9c3fe11e30b32f71bc7da03c4f86a4c8a218453.zip.zip
Password: infected
-
1339d8437b13ceca77e24912f9c3fe11e30b32f71bc7da03c4f86a4c8a218453.exe.exe windows x86
Password: infected
df93d21c471ccff0ce55a97430489352
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumSystemCodePagesW
LocalFree
FindNextFileW
WriteConsoleInputW
EnumDateFormatsA
OpenMutexW
GetConsoleAliasesLengthW
CopyFileExW
ReadConsoleOutputCharacterA
SetVolumeLabelA
GetEnvironmentStrings
VerifyVersionInfoW
QueryDosDeviceA
EnumCalendarInfoExA
RequestWakeupLatency
LocalSize
TlsGetValue
CreateFileA
SetMailslotInfo
GetWindowsDirectoryA
GetModuleHandleW
VirtualFree
CreateDirectoryExW
GetLogicalDriveStringsA
ReadConsoleInputW
FindNextVolumeMountPointA
OpenWaitableTimerA
TransactNamedPipe
SearchPathA
IsSystemResumeAutomatic
CallNamedPipeW
GetProcAddress
LoadLibraryA
GlobalAlloc
MoveFileWithProgressW
GetBinaryTypeA
GetThreadSelectorEntry
GetCommandLineW
InterlockedExchange
FillConsoleOutputCharacterA
CancelTimerQueueTimer
GetConsoleTitleW
CopyFileA
CreateTimerQueueTimer
FindResourceA
FormatMessageW
CreateJobObjectA
GetConsoleFontSize
FindFirstVolumeW
InterlockedIncrement
GetModuleHandleA
GetACP
HeapSetInformation
EnumCalendarInfoW
GetConsoleTitleA
GetPrivateProfileStructW
EnumCalendarInfoA
GetConsoleAliasExesLengthW
InterlockedExchangeAdd
InterlockedDecrement
GetVolumeNameForVolumeMountPointW
SetCalendarInfoA
TerminateThread
MoveFileA
FindAtomW
GetMailslotInfo
FreeEnvironmentStringsA
SetConsoleTitleA
SetVolumeMountPointA
GetAtomNameW
FlushConsoleInputBuffer
GetOEMCP
GetProcessIoCounters
CreateDirectoryExA
GlobalFindAtomW
GetTickCount
FindFirstChangeNotificationW
LoadLibraryW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
RtlUnwind
GetLastError
DeleteFileA
GetCommandLineA
GetStartupInfoA
HeapAlloc
HeapFree
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
EnterCriticalSection
LeaveCriticalSection
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
GetCPInfo
IsValidCodePage
HeapSize
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
SetFilePointer
GetConsoleCP
GetConsoleMode
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
FlushFileBuffers
ReadFile
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CloseHandle
user32
GetMessageTime
gdi32
GetBoundsRect
Sections
.text Size: 77KB - Virtual size: 77KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 69KB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ