Static task
static1
Behavioral task
behavioral1
Sample
aa50a1e524059a4d184933850bc664a6752608a10ba1e876a4802542dc341033.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
aa50a1e524059a4d184933850bc664a6752608a10ba1e876a4802542dc341033.exe
Resource
win10v2004-20220812-en
General
-
Target
aa50a1e524059a4d184933850bc664a6752608a10ba1e876a4802542dc341033.zip
-
Size
682KB
-
MD5
fecea0c22b3fc1a848902bcae0d16027
-
SHA1
a5fd3809a7640e4ec3bf7617fff3f70eaff1562b
-
SHA256
603e1f18fff33f5fcc99ebf195a5b0df5f7a3a6fc98a03e772a7da4993d737db
-
SHA512
0bc85d78c7d4f43ea2457a0ecb40be8b78f0d6d821474acec03d9e3d57429fef7b9a79275637e19d678b9655e6ae4bd9d1a3e72218300deecc940b62d6701379
-
SSDEEP
12288:bLL+aXlBblQg4+E68dyx2nTKq3vu3HmleiPWW7GzWRhzEMrEXqk2fB:bLDXlp6SE683uqWX5iPDOENZEcB
Malware Config
Signatures
Files
-
aa50a1e524059a4d184933850bc664a6752608a10ba1e876a4802542dc341033.zip.zip
Password: infected
-
aa50a1e524059a4d184933850bc664a6752608a10ba1e876a4802542dc341033.exe.exe windows x86
Password: infected
9de6be7a88c6b62e6fe9c345eca2a6c5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFindFileNameA
kernel32
SetEndOfFile
GetEnvironmentVariableA
LockResource
FreeLibrary
GetProcAddress
VirtualAlloc
VirtualFree
VirtualProtect
HeapAlloc
HeapFree
GetProcessHeap
SetLastError
LoadResource
SizeofResource
GetNativeSystemInfo
LoadLibraryA
GetModuleHandleA
FindResourceA
IsBadReadPtr
lstrlenA
GetFileSize
ReadFile
CloseHandle
CreateFileA
OpenProcess
TerminateProcess
CreateToolhelp32Snapshot
Process32First
Process32Next
ExitProcess
lstrcmpiA
GetModuleFileNameA
GetCurrentProcess
WriteConsoleW
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetLastError
FormatMessageW
WideCharToMultiByte
CreateFileW
FindClose
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
GetFileInformationByHandle
AreFileApisANSI
MultiByteToWideChar
InitializeCriticalSectionAndSpinCount
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
GlobalAlloc
GlobalFree
RaiseException
RtlUnwind
LoadLibraryExW
GetModuleHandleExW
GetStdHandle
WriteFile
GetACP
HeapReAlloc
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadConsoleW
SetFilePointerEx
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
HeapSize
Sections
.text Size: 242KB - Virtual size: 241KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cdata Size: 781KB - Virtual size: 781KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ