Static task
static1
Behavioral task
behavioral1
Sample
HEUR-Trojan.Win32.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
HEUR-Trojan.Win32.exe
Resource
win10v2004-20220812-en
General
-
Target
b0557c0ab61fcaa8346e7cf297ff28330c5f5bca420f0708f564f5a1847a6813
-
Size
41KB
-
MD5
8cbd6cf5e88837e4e51b3086f12de34b
-
SHA1
412662298a844e919b77decac91ade33fcebc735
-
SHA256
b03b422ee75197b696ef8a3ef653ba63b7777c2b423695d2578ab055e415b1b5
-
SHA512
8962cc8ef3bbd83589ee485b416b2979846d29f51d696b562a907559434b7295c75303812b272912e58ad871c4b8acb59ca1197691b872869ecd362c2334fc77
-
SSDEEP
768:pTb4gcEaTTJzmVBdBdTuCEalzensh8ZBeIqOikcbig/nlGCEqBUWjFmLf5Shx2vS:OKaT41SCE7n4eqOF2hcqBlFEf0b2vpQ
Malware Config
Signatures
Files
-
b0557c0ab61fcaa8346e7cf297ff28330c5f5bca420f0708f564f5a1847a6813.zip
Password: infected
-
HEUR-Trojan.Win32.Generic-b0557c0ab61fcaa8346e7cf297ff28330c5f5bca420f0708f564f5a1847a6813.exe windows x86
Password: infected
1bae2cff21947ea3cded30f25dbbacc5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateEventA
CloseHandle
TerminateThread
WaitForSingleObject
SetEvent
ResumeThread
CreateThread
GetProcAddress
LoadLibraryA
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
ResetEvent
lstrcpyA
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
GetWindowsDirectoryA
FreeLibrary
MultiByteToWideChar
WideCharToMultiByte
lstrcmpA
GetPrivateProfileStringA
GetVersionExA
DeleteFileA
GetLastError
CreateDirectoryA
GetFileAttributesA
CreateProcessA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
RemoveDirectoryA
GetFileSize
CreateFileA
ReadFile
SetFilePointer
WriteFile
MoveFileA
WritePrivateProfileStringA
GetCurrentProcess
OpenProcess
GetLocalTime
Sleep
InterlockedExchange
ExitProcess
GlobalFree
GlobalLock
GlobalAlloc
GlobalUnlock
GlobalSize
GetTickCount
LocalSize
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
Process32Next
lstrcmpiA
GetCurrentThreadId
DeviceIoControl
GetSystemInfo
GlobalMemoryStatus
FreeResource
LoadResource
FindResourceA
WinExec
SetErrorMode
CreateMutexA
GetModuleFileNameA
RaiseException
GetModuleHandleA
msvcrt
strstr
memcmp
_CxxThrowException
strchr
malloc
strcpy
strcmp
free
_except_handler3
strrchr
atoi
strncmp
strncpy
strcat
_errno
strlen
calloc
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_ftol
ceil
memmove
__CxxFrameHandler
memcpy
_beginthreadex
??3@YAXPAX@Z
_strupr
_strnicmp
memset
??2@YAPAXI@Z
_strcmpi
msvcp60
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
msvfw32
ICCompressorFree
ICSeqCompressFrameEnd
ICOpen
ICSendMessage
ICSeqCompressFrameStart
ICSeqCompressFrame
ICClose
Sections
.text Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ujyhkuy Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 220B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ