Static task
static1
Behavioral task
behavioral1
Sample
2558d0817586306d0ddf7beadd371785cd0a0b7ed860ac62760dbbc92866008a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2558d0817586306d0ddf7beadd371785cd0a0b7ed860ac62760dbbc92866008a.exe
Resource
win10v2004-20221111-en
General
-
Target
9045917631.zip
-
Size
718KB
-
MD5
5ea908c21505256ce980b05bb8d7d72d
-
SHA1
bf95bb4c588cedf638e728082cd73ce192ad2182
-
SHA256
9f4a5e8cc41c06bbb7a5c98cabae64b32d84be565a3e2aa7b877bf4ab4248b88
-
SHA512
820e7de6d5ec0e881d85e78de3c7a1c6d3e7052b9f34545273f7383f10daa96773435d1ee2800c18b5a85fd495a1c3aec4f0754371458eeaa6e3000944a3c863
-
SSDEEP
12288:cPvHq6BYldyj9zZ2DRfT/sAOHhB4peDnqoAmiapyGr9aJOaQu7FebSZA:cPv30yDSflOB17TAmiEyG4gao
Malware Config
Signatures
Files
-
9045917631.zip.zip
Password: infected
-
2558d0817586306d0ddf7beadd371785cd0a0b7ed860ac62760dbbc92866008a.exe windows x86
Password: infected
1e6f07b9f9776897a3906ee0a0569fcf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesA
SetUnhandledExceptionFilter
QueryPerformanceCounter
DeviceIoControl
LeaveCriticalSection
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetWindowsDirectoryA
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
LoadResource
LoadLibraryA
LoadLibraryW
LocalAlloc
MulDiv
lstrcmpA
lstrlenA
lstrlenW
FindResourceA
EnumResourceLanguagesA
IsBadWritePtr
CloseHandle
CreateFileW
SetFilePointerEx
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
HeapReAlloc
HeapSize
GetStringTypeW
SetStdHandle
GetFileType
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
GetCommandLineW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
DecodePointer
CreateFileA
VirtualAlloc
GetTickCount64
CreateDirectoryA
GetCommandLineA
LoadLibraryExA
GetProcAddress
FreeLibrary
GetTickCount
GetSystemDirectoryA
SleepEx
FindNextFileA
FindFirstFileA
FindClose
MoveFileExW
LCMapStringW
MultiByteToWideChar
HeapFree
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
GetStartupInfoW
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
TerminateProcess
RaiseException
RtlUnwind
GetLastError
SetLastError
EncodePointer
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
WriteFile
HeapAlloc
WriteConsoleW
user32
GetDC
SendMessageA
SystemParametersInfoA
CreateIconIndirect
GetWindowThreadProcessId
FindWindowA
IntersectRect
SetRect
GetSysColor
ScreenToClient
DefWindowProcA
GetCursorPos
MessageBoxA
AdjustWindowRectEx
RedrawWindow
GetCursor
CreatePopupMenu
GetSystemMetrics
SetCapture
GetKeyState
GetDoubleClickTime
AttachThreadInput
SendMessageTimeoutA
RegisterWindowMessageA
CreateDialogParamA
PostQuitMessage
gdi32
CreatePolygonRgn
GetStockObject
CreateSolidBrush
CreateRectRgn
CreateICA
CreateFontIndirectW
CreateDCA
CreateBrushIndirect
CreateBitmap
advapi32
RegNotifyChangeKeyValue
RegEnumKeyA
RegCloseKey
RegOpenKeyA
ole32
CoInitializeEx
CoCreateGuid
shlwapi
PathFindOnPathA
PathGetDriveNumberA
ord155
StrToIntA
PathAppendA
PathFileExistsW
PathFindSuffixArrayA
Sections
.text Size: 233KB - Virtual size: 232KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 717KB - Virtual size: 716KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ