Static task
static1
Behavioral task
behavioral1
Sample
9f11f05aaaf2555ddffffbfc1880d7cb7490b28f3b657220fec74833d457e638.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9f11f05aaaf2555ddffffbfc1880d7cb7490b28f3b657220fec74833d457e638.exe
Resource
win10v2004-20221111-en
General
-
Target
441319b4a1253462ac2f3efec405a530.bin
-
Size
213KB
-
MD5
5c2662033e4d18e8264bd71c9d2eae28
-
SHA1
3aa24595612da178a9b0209f4f9573abc4028369
-
SHA256
50f6d2588fc5ef28c6c8bfbe728c11728286583ddbf5d5414205df3909fc54ad
-
SHA512
fced99ab7c12c53017f37d000b7da51cd7666d85d954bfd69ee67de6813a9747cc6af69ee2ccce1bc65caeb3263882e21ef270d75d76112fbb91939414146768
-
SSDEEP
3072:qfljFi7h1Z18cHFT7RF5adX7IRmhwwebU8L3VBJwKrHNnvNxnq7Z39nxNaokXhM9:Clxi7vg097adXy7we3rHJSl9kXhM9
Malware Config
Signatures
Files
-
441319b4a1253462ac2f3efec405a530.bin.zip
Password: infected
-
9f11f05aaaf2555ddffffbfc1880d7cb7490b28f3b657220fec74833d457e638.exe.exe windows x86
Password: infected
7973a61531c93981746e35cc3b7b0ae0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VerSetConditionMask
FlushConsoleInputBuffer
GetModuleHandleW
ReadConsoleW
GetWindowsDirectoryA
GetGeoInfoW
GetConsoleAliasExesW
FindResourceExA
LoadLibraryW
GetNamedPipeInfo
GetConsoleAliasW
GetDevicePowerState
IsBadStringPtrA
LCMapStringA
SetLastError
lstrcmpiA
GetProcAddress
VirtualAlloc
InterlockedIncrement
BuildCommDCBW
LoadLibraryA
OpenWaitableTimerW
LocalAlloc
DnsHostnameToComputerNameA
AddAtomW
CreateEventW
SetCommMask
FreeEnvironmentStringsW
VirtualProtect
GetConsoleCursorInfo
EndUpdateResourceA
CreateWaitableTimerA
GetConsoleProcessList
EnumCalendarInfoExA
LCMapStringW
GetStringTypeW
MultiByteToWideChar
CreateFiber
lstrlenA
HeapSize
SetPriorityClass
GetLastError
HeapFree
HeapAlloc
Sleep
ExitProcess
GetStartupInfoW
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
WriteFile
GetStdHandle
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
InterlockedDecrement
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleA
GetLocaleInfoA
WideCharToMultiByte
GetStringTypeA
user32
GetCaretPos
WindowFromDC
GetMenuInfo
GetCursorInfo
gdi32
GetCharWidthA
advapi32
BackupEventLogW
Sections
.text Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 91KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.coseb Size: 1024B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.kilupej Size: 1024B - Virtual size: 723B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.puvid Size: 1024B - Virtual size: 963B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ