Static task
static1
Behavioral task
behavioral1
Sample
09c55db03356ef131aed108a5983b70994301132a3ac6f5743a0a6cb6bb83818.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
09c55db03356ef131aed108a5983b70994301132a3ac6f5743a0a6cb6bb83818.exe
Resource
win10v2004-20220812-en
General
-
Target
84290327a8ab5af7ad02aee63fcb57f3.bin
-
Size
313KB
-
MD5
94f77b6e31abe3894a16dfab97b65447
-
SHA1
3c6c6041c328b2a2c679203159c8c916e0f587c9
-
SHA256
e47d0fdab2f7af0c03bb65f87a35819fd11db48e4aa8889475044c1d1cd61db1
-
SHA512
2a1913ea45cc10b31f73b3588ab4dc5a3a129cbedeca11e1dbadab9ddc43ce59b2221f6dda1aadf7f17062a9b3102f086b5e73d34d07d9246479595cd93749dc
-
SSDEEP
6144:Ayzv3oYy2Qsuicz9muy1lVlCwtOj7roZ61ixWaNhtFWkUQ3q0x/Hnzka8Tq:A+v3oYHDuHzwZD7jYPoBJ3VDlb8u
Malware Config
Signatures
Files
-
84290327a8ab5af7ad02aee63fcb57f3.bin.zip
Password: infected
-
09c55db03356ef131aed108a5983b70994301132a3ac6f5743a0a6cb6bb83818.exe.exe windows x86
Password: infected
adc671d382ab71ca551afdb52eb0ffc0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
LPSAFEARRAY_UserSize
kernel32
GetNLSVersion
GetProcAddress
GetModuleFileNameW
GetLastError
TerminateProcess
WaitForSingleObject
TzSpecificLocalTimeToSystemTime
CloseHandle
OutputDebugStringA
GetModuleHandleA
user32
GetWindowThreadProcessId
setupapi
SetupDiEnumDeviceInfo
Sections
.text Size: 68KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 360KB - Virtual size: 359KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ