Static task
static1
Behavioral task
behavioral1
Sample
b3ea0f4f442da3106c0d4f97cf20e244b84d719232ca90b3b7fc6e59e37e1ca1.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b3ea0f4f442da3106c0d4f97cf20e244b84d719232ca90b3b7fc6e59e37e1ca1.dll
Resource
win10v2004-20220812-en
General
-
Target
230130-w6rp4abe89_pw_infected.zip
-
Size
111KB
-
MD5
2bfdea16cf53002cbdf993cdadf7cd97
-
SHA1
80892dbbf6702160e863eb4a9ca0fc1ca196da98
-
SHA256
a8fdc3e6deb605a52095c0b7726aa097e97a2285acbffea80c2bd4935e8b6055
-
SHA512
5c4aad8922e03cc174f32a8a33a4cb6ce98847c7321e2997c553ecedff42b18a07418ad8fb566205e0abf2079a399b2cc3e6cff75bdda4c1e0fde1ba7031f788
-
SSDEEP
3072:3IFcx454zN5jEgnu5D94qZqIW6LhD39fDjdCTgq0Lsu/:Mcx45q5jEgn4D94qIIW6L93hDBCTgfLH
Malware Config
Signatures
Files
-
230130-w6rp4abe89_pw_infected.zip.zip
Password: infected
-
8943176162.zip.zip
Password: infected
-
b3ea0f4f442da3106c0d4f97cf20e244b84d719232ca90b3b7fc6e59e37e1ca1.dll windows x64
Password: infected
6c7dcad9de2389724268ab9b2efad94a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ntdll
RtlPcToFileHeader
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
__chkstk
RtlUnwindEx
NtQuerySystemInformation
kernel32
MultiByteToWideChar
GetLocalTime
lstrlenW
FreeLibraryAndExitThread
GetCurrentThreadId
SuspendThread
ResumeThread
CloseHandle
GetLastError
CreateThread
lstrcpyW
OpenThread
WriteConsoleW
Sleep
TlsGetValue
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
WriteFile
SetStdHandle
HeapReAlloc
HeapSize
GetStringTypeW
GetFileType
GetStdHandle
GetProcessHeap
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
RaiseException
InterlockedFlushSList
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
CreateFileW
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetCurrentProcess
TerminateProcess
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
WideCharToMultiByte
HeapAlloc
HeapFree
LCMapStringW
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
user32
wsprintfW
advapi32
CryptSetKeyParam
CryptDecrypt
ws2_32
htons
WSAGetLastError
Sections
.text Size: 169KB - Virtual size: 169KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ