Static task
static1
Behavioral task
behavioral1
Sample
7c00573505ee69bef99968a44671ebfbf7cfbb6990771e3f9e55dc29aadf636c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7c00573505ee69bef99968a44671ebfbf7cfbb6990771e3f9e55dc29aadf636c.exe
Resource
win10v2004-20220812-en
General
-
Target
4936831157218397ece7fcee89d604b2.bin
-
Size
207KB
-
MD5
1c627f6b9591638792ee19781f112190
-
SHA1
32709c2da7757565aaaebf7d74495e5eca12bc26
-
SHA256
ea2c0a2f2912b377c42a0982bdac667a5569ac3ce3b710d60a98a07cc5c13581
-
SHA512
a831efb129877433886064dd7a48ab3cd232480f36d242a3a35677fb737e4bce063057be208c5af7fd455261979d429ef081c9206e1aa88ac5df9fa41c9b04e2
-
SSDEEP
6144:RhMS2sAJUB9IF0+GX3RdJYvNt4frvDW7eInrpwFp:RhvAJUB9M0ZRdgsr7WvAp
Malware Config
Signatures
Files
-
4936831157218397ece7fcee89d604b2.bin.zip
Password: infected
-
7c00573505ee69bef99968a44671ebfbf7cfbb6990771e3f9e55dc29aadf636c.exe.exe windows x86
Password: infected
64f2017133017378e6738b9a4be235bb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
BuildCommDCBAndTimeoutsA
EndUpdateResourceW
GetCommState
ReadConsoleA
GetCurrentProcess
QueryDosDeviceA
SetHandleInformation
GetComputerNameW
GetWindowsDirectoryA
GetGeoInfoW
GetDateFormatA
SetProcessPriorityBoost
GlobalAlloc
EnumResourceLanguagesA
LCMapStringA
InterlockedExchange
GetCPInfoExW
GetLastError
FindResourceExW
GetProcAddress
VirtualAlloc
EnumSystemCodePagesW
SetTimerQueueTimer
LoadLibraryA
WriteConsoleA
AddAtomW
GetCommMask
FoldStringW
FoldStringA
GetModuleHandleA
BuildCommDCBA
GetConsoleCursorInfo
ReadConsoleInputW
TerminateJobObject
GetTempPathA
GlobalReAlloc
WriteConsoleOutputCharacterW
lstrcpynA
SetLastError
IsBadStringPtrW
LCMapStringW
GetStartupInfoW
HeapAlloc
HeapFree
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
Sleep
HeapSize
ExitProcess
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
WideCharToMultiByte
user32
LoadMenuA
GetListBoxInfo
gdi32
GetTextExtentExPointA
advapi32
ReportEventW
ole32
ReadClassStm
Sections
.text Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 183KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bawofiv Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.novo Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 162KB - Virtual size: 161KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ