Static task
static1
Behavioral task
behavioral1
Sample
853b424c47207c0f989bddab7a6ea8774e25126229bbaa122ea455612d652ef9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
853b424c47207c0f989bddab7a6ea8774e25126229bbaa122ea455612d652ef9.exe
Resource
win10v2004-20220812-en
General
-
Target
0113a20f568e6c2fc6d1d727dee1efb0.bin
-
Size
210KB
-
MD5
6b5e40ba72438c2b6d63e3a87c54946c
-
SHA1
edb84e09b07d8f433238029915c5ca14cb1406dd
-
SHA256
53612b4ebeae44186a82fce90a9807b3cab21f9244089ce1a5ee8c9e009c1ab4
-
SHA512
c8a4d1e61c0dc9931ce69a3fe87591fb8bd92217dc9db6bea027ca18881222b4a20ebefa291abfdb9af251aee9fb476490ce45d0f148b9003fe23da1888481e1
-
SSDEEP
6144:xE+5yKLNYEJYwzKxiknUzLK0Q/nD7tCqu:xE+5CKYwz8XUzLtQ/nfk1
Malware Config
Signatures
Files
-
0113a20f568e6c2fc6d1d727dee1efb0.bin.zip
Password: infected
-
853b424c47207c0f989bddab7a6ea8774e25126229bbaa122ea455612d652ef9.exe.exe windows x86
Password: infected
e5f35c047e0fdde323b83e51e689dfb5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
GetConsoleAliasExesA
GetCPInfo
InterlockedIncrement
GetConsoleAliasA
SetConsoleActiveScreenBuffer
GetGeoInfoW
FindResourceExA
GlobalAlloc
LoadLibraryW
SetCommConfig
HeapCreate
GetDevicePowerState
LCMapStringA
GetLastError
SetLastError
GetProcAddress
VirtualAlloc
EnumSystemCodePagesW
BuildCommDCBW
IsBadStringPtrW
LoadLibraryA
OpenWaitableTimerW
DnsHostnameToComputerNameA
AddAtomW
CreateEventW
GetCommMask
FoldStringA
SetNamedPipeHandleState
SetConsoleCursorInfo
lstrcmpiW
GetModuleHandleA
VirtualProtect
EndUpdateResourceA
GetWindowsDirectoryW
GetVolumeNameForVolumeMountPointW
CreateWaitableTimerA
GetConsoleProcessList
ReadConsoleOutputCharacterW
EnumCalendarInfoExA
LCMapStringW
GetStringTypeW
SetPriorityClass
CreateFiber
GetComputerNameA
MultiByteToWideChar
GetStringTypeA
HeapAlloc
GetModuleHandleW
Sleep
ExitProcess
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
HeapReAlloc
WriteFile
GetStdHandle
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
InterlockedDecrement
HeapSize
RaiseException
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
WideCharToMultiByte
user32
GetCaretPos
GetMenuItemID
LoadMenuA
gdi32
GetCharWidthA
advapi32
BackupEventLogA
winhttp
WinHttpOpen
msimg32
AlphaBlend
Sections
.text Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 179KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tegisoy Size: 1024B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fal Size: 1024B - Virtual size: 723B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.cuw Size: 1024B - Virtual size: 963B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 152KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ