Static task
static1
Behavioral task
behavioral1
Sample
5704d086bf0ed3f28c19e39cbfc748fa2b925a91d95728db44400a595b8ae9d4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5704d086bf0ed3f28c19e39cbfc748fa2b925a91d95728db44400a595b8ae9d4.exe
Resource
win10v2004-20220812-en
General
-
Target
5704d086bf0ed3f28c19e39cbfc748fa2b925a91d95728db44400a595b8ae9d4.zip
-
Size
110KB
-
MD5
b9f38893a69c6dc920fe8b89990d6697
-
SHA1
b40cd8589cdf39e9915c1359120368034160fa47
-
SHA256
8539d3171d3fccdc07e26ff584dc046a1cb018e32771cedd19bb3298a10a41d6
-
SHA512
06d21d158306a447311f91be98b5f927c38e018041dfc66f82d058f269574028e1ae182d45fd666c347fd5b676cefb099e897d7be4ad11f28f70f51e7b55fba0
-
SSDEEP
3072:hBrt9QrYEzuVO99Fdclb3adN0X/xcYAjz9KUXw0t5ses5xLt3Fo:hBrTnouY99a3g0vxch99Xw0ts5zS
Malware Config
Signatures
Files
-
5704d086bf0ed3f28c19e39cbfc748fa2b925a91d95728db44400a595b8ae9d4.zip.zip
Password: infected
-
5704d086bf0ed3f28c19e39cbfc748fa2b925a91d95728db44400a595b8ae9d4.exe.exe windows x86
Password: infected
df93d21c471ccff0ce55a97430489352
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumSystemCodePagesW
LocalFree
FindNextFileW
WriteConsoleInputW
EnumDateFormatsA
OpenMutexW
GetConsoleAliasesLengthW
CopyFileExW
ReadConsoleOutputCharacterA
SetVolumeLabelA
GetEnvironmentStrings
VerifyVersionInfoW
QueryDosDeviceA
EnumCalendarInfoExA
RequestWakeupLatency
LocalSize
TlsGetValue
CreateFileA
SetMailslotInfo
GetWindowsDirectoryA
GetModuleHandleW
VirtualFree
CreateDirectoryExW
GetLogicalDriveStringsA
ReadConsoleInputW
FindNextVolumeMountPointA
OpenWaitableTimerA
TransactNamedPipe
SearchPathA
IsSystemResumeAutomatic
CallNamedPipeW
GetProcAddress
LoadLibraryA
GlobalAlloc
MoveFileWithProgressW
GetBinaryTypeA
GetThreadSelectorEntry
GetCommandLineW
InterlockedExchange
FillConsoleOutputCharacterA
CancelTimerQueueTimer
GetConsoleTitleW
CopyFileA
CreateTimerQueueTimer
FindResourceA
FormatMessageW
CreateJobObjectA
GetConsoleFontSize
FindFirstVolumeW
InterlockedIncrement
GetModuleHandleA
GetACP
HeapSetInformation
EnumCalendarInfoW
GetConsoleTitleA
GetPrivateProfileStructW
EnumCalendarInfoA
GetConsoleAliasExesLengthW
InterlockedExchangeAdd
InterlockedDecrement
GetVolumeNameForVolumeMountPointW
SetCalendarInfoA
TerminateThread
MoveFileA
FindAtomW
GetMailslotInfo
FreeEnvironmentStringsA
SetConsoleTitleA
SetVolumeMountPointA
GetAtomNameW
FlushConsoleInputBuffer
GetOEMCP
GetProcessIoCounters
CreateDirectoryExA
GlobalFindAtomW
GetTickCount
FindFirstChangeNotificationW
LoadLibraryW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
RtlUnwind
GetLastError
DeleteFileA
GetCommandLineA
GetStartupInfoA
HeapAlloc
HeapFree
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
EnterCriticalSection
LeaveCriticalSection
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
GetCPInfo
IsValidCodePage
HeapSize
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
SetFilePointer
GetConsoleCP
GetConsoleMode
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
FlushFileBuffers
ReadFile
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CloseHandle
user32
GetMessageTime
gdi32
GetBoundsRect
Sections
.text Size: 77KB - Virtual size: 77KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 70KB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ