Static task
static1
Behavioral task
behavioral1
Sample
595726f3d15c2d0793d1bff64c05bfe3c26fc248098274bf06697a43b92cdd31.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
595726f3d15c2d0793d1bff64c05bfe3c26fc248098274bf06697a43b92cdd31.exe
Resource
win10v2004-20220812-en
General
-
Target
b7bd2834678cdd544b62aac969118651.bin
-
Size
190KB
-
MD5
b6c706432aa879d17ae718578566f5e7
-
SHA1
98d551ff78f7774befbce9ec4c88420428edb527
-
SHA256
5951f058321624cf8642979fe52a8debcc66e6c0eccd23bf924e82fec691762d
-
SHA512
813c15979dab2aae000f80457b3302aea04763a8b326bd5cd3043eafbb3ed6b00887a5f1a734fc441c76f3b7d0e66f754346709f20f129fa02ee859cf86782a5
-
SSDEEP
3072:/YAipE/plmMNbomrqN5UboRbr7fH2IIokFzgxEI2eOjte1pKVQ1nIL0FixRbvBjh:/YAi8StGot7fWIIokFc6Qce1UaVLFizf
Malware Config
Signatures
Files
-
b7bd2834678cdd544b62aac969118651.bin.zip
Password: infected
-
595726f3d15c2d0793d1bff64c05bfe3c26fc248098274bf06697a43b92cdd31.exe.exe windows x86
Password: infected
e2474d94404febb68b5af309915f543b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVolumeNameForVolumeMountPointA
FindResourceExW
InterlockedIncrement
GetCurrentProcess
SetHandleInformation
GetProcessPriorityBoost
GetConsoleAliasesA
GetGeoInfoW
GetConsoleAliasExesW
GetDateFormatA
GlobalAlloc
LoadLibraryW
WriteConsoleW
IsBadStringPtrA
LCMapStringA
GetCPInfoExW
GetLastError
SetLastError
GetProcAddress
VirtualAlloc
HeapSize
EnumSystemCodePagesW
LoadLibraryA
WriteConsoleA
GetProcessWorkingSetSize
DnsHostnameToComputerNameA
AddAtomW
QueryDosDeviceW
GetCommMask
SetCommMask
FoldStringW
GetModuleHandleA
CancelTimerQueueTimer
BuildCommDCBA
SetCalendarInfoA
EndUpdateResourceA
TerminateJobObject
GetWindowsDirectoryW
EnumResourceLanguagesW
LCMapStringW
GetStringTypeW
MultiByteToWideChar
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
HeapAlloc
HeapFree
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
InterlockedDecrement
TerminateProcess
IsDebuggerPresent
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
GetLocaleInfoA
WideCharToMultiByte
GetStringTypeA
RaiseException
user32
DdeQueryStringW
LoadMenuW
GetListBoxInfo
winhttp
WinHttpOpen
Sections
.text Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 91KB - Virtual size: 183KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.luriya Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 153KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ