Static task
static1
Behavioral task
behavioral1
Sample
zmoperes.ri.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
zmoperes.ri.exe
Resource
win10v2004-20220812-en
General
-
Target
1c81272ffc28b29a82d8313bd74d1c6030c2af1ba4b165c44dc8ea6376679d9f.zip
-
Size
258KB
-
MD5
a4b3000c36c3799244fa6156ad67f05b
-
SHA1
a2f1250857c17cc4244f8a211b199a77cd21c2b0
-
SHA256
bc387de543591660fa5cfb3f69e0c7d704b8be15b6ab631d2108477f1ea46424
-
SHA512
b3b25fe2f9bb09cfb67ae9935c32be7fc4c99b492a11e70b037ae9f38a4ac70d5532383eeae5e867ad33a3a7f1f07856654941c420da4f18b12374ccdfbbe191
-
SSDEEP
6144:gW7oncFkSGMagwEXnX6ni5oqjrgF1SPi8okHOgQo8KRWnAa/a5:glykSugF3qnqoqgyPixkDInh+
Malware Config
Signatures
Files
-
1c81272ffc28b29a82d8313bd74d1c6030c2af1ba4b165c44dc8ea6376679d9f.zip.zip
Password: infected
-
zmoperes.ri.bin.exe windows x86
cf3e68dbb8e7a45740fe39166a687412
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualFree
GetProcessHeap
IsBadReadPtr
LoadLibraryW
Sleep
SizeofResource
GetLastError
GetProcAddress
HeapFree
LockResource
GetModuleHandleA
IsDebuggerPresent
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
HeapAlloc
LoadResource
FreeLibrary
VirtualAlloc
FindResourceA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
QueryPerformanceCounter
user32
CreateWindowExW
SendMessageW
InSendMessage
MessageBoxA
advapi32
CryptEncrypt
CryptImportKey
CryptAcquireContextW
CryptDestroyKey
msvcp90
?length@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
??A?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAADI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
msvcr90
_lock
_onexit
_decode_pointer
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_encode_pointer
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_crt_debugger_hook
_except_handler4_common
?terminate@@YAXXZ
_invoke_watson
_controlfp_s
_stricmp
__dllonexit
_unlock
free
memcpy_s
_initterm_e
malloc
memset
realloc
memcpy
Sections
.text Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 286KB - Virtual size: 285KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ