Static task
static1
Behavioral task
behavioral1
Sample
01cd57e3acf592cef7173860da12ef878182a1b18a701819756fae54373e0051.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
01cd57e3acf592cef7173860da12ef878182a1b18a701819756fae54373e0051.exe
Resource
win10v2004-20221111-en
General
-
Target
01cd57e3acf592cef7173860da12ef878182a1b18a701819756fae54373e0051.zip
-
Size
187KB
-
MD5
8ffa156806f6de5616d493e5b2b90ee7
-
SHA1
f82515e8f671762f7ec80be38fff330f6d4ce6ab
-
SHA256
2b9f8a19259f3c54992713c1d3c5e00db2dd97e8669792103939f2b448511b3a
-
SHA512
16dbabdc78a4b891d77694035bb7aadec2cac8c45d335cce96ccee1549e59d88f46e6fffdc31dda2844f300b9f8d588edd432b0ac82fbd84576786c6b5409fb4
-
SSDEEP
3072:HUt40LpZFOsZ9hgilCWWEPjhrjaOAjvjlZmxzYnWgN2taH7vZIx99nXoZ4Q3:HUnF1ZrgSCWWKjhrxevjlZmxw2gH7xqC
Malware Config
Signatures
Files
-
01cd57e3acf592cef7173860da12ef878182a1b18a701819756fae54373e0051.zip.zip
Password: infected
-
01cd57e3acf592cef7173860da12ef878182a1b18a701819756fae54373e0051.exe.exe windows x86
Password: infected
f24c70adc5293af8000f2c39db7b30c1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameW
GetTickCount
GetGeoInfoW
GetDateFormatA
GlobalAlloc
lstrcpynW
EnumSystemCodePagesA
LCMapStringA
GetLastError
GetProcAddress
VirtualAlloc
LoadLibraryA
CancelWaitableTimer
BuildCommDCBAndTimeoutsW
GetCommMask
AddAtomA
GetPrivateProfileStructA
FoldStringA
GetModuleHandleA
SetLocaleInfoW
BuildCommDCBA
GetShortPathNameW
ReadConsoleInputW
GetCurrentProcess
GetProcessWorkingSetSize
InterlockedIncrement
LCMapStringW
GetStringTypeW
HeapFree
HeapAlloc
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
Sleep
ExitProcess
GetCommandLineA
GetStartupInfoA
RtlUnwind
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
WriteFile
GetStdHandle
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
InterlockedDecrement
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
user32
LoadMenuA
GetListBoxInfo
gdi32
GetTextExtentExPointW
advapi32
ReportEventA
ole32
ReadClassStg
Sections
.text Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 573KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.juxahok Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.doj Size: 1024B - Virtual size: 723B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 151KB - Virtual size: 150KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ