Static task
static1
Behavioral task
behavioral1
Sample
603a3165c1052203f6dbac4a98dc04f4974e1832c80cac03df6453b687d1d3ae.exe
Resource
win7-20220812-en
General
-
Target
1a94e0b409130c7d71113a0c83cb0e4b.bin
-
Size
235KB
-
MD5
fa6bdd5025f718ff53afc5dd6249c4cb
-
SHA1
e963d88c390ddacfb31af5fa726865b8cda65273
-
SHA256
ba3b293ac098dd21698cdcc8adeaf2de6ca37a2f691428b086cdd0e45089098b
-
SHA512
0e907ec38b9664994022dff4e3a861b40089f1d8f6eff5fc552a1a7cd74e685590e739e253d6b9db4b1b7093c7f34f403cfe3f8e5deb9cf642c74c8b9b94e1ac
-
SSDEEP
6144:7pcsD76bFDciseyvQK7+BdLAoY6gjoCE4CbYjl3SMLIK9Np:7zCwey4K7UdMV6gjoCE4YMcKfp
Malware Config
Signatures
Files
-
1a94e0b409130c7d71113a0c83cb0e4b.bin.zip
Password: infected
-
603a3165c1052203f6dbac4a98dc04f4974e1832c80cac03df6453b687d1d3ae.exe.exe windows x86
Password: infected
3eec0fba6b043cbe25b0432db71dd656
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
FindActCtxSectionStringW
WriteConsoleInputW
ClearCommError
WriteFile
FindFirstVolumeMountPointA
CreateDirectoryExW
LocalSize
WaitForMultipleObjects
ReadConsoleInputA
FindNextVolumeMountPointA
OpenWaitableTimerW
VerifyVersionInfoW
GetVersionExW
GetProcessId
OpenEventA
WriteConsoleOutputAttribute
GetLocaleInfoW
GetProcAddress
LocalAlloc
GetCommandLineW
GetBinaryTypeA
OpenMutexA
GetConsoleTitleA
SearchPathA
FindResourceA
FreeConsole
GetModuleHandleW
UpdateResourceW
GetLastError
GetProfileSectionW
SetConsoleCursorInfo
RequestWakeupLatency
WritePrivateProfileSectionA
GlobalFlags
GetConsoleAliasesLengthW
FindResourceW
SetVolumeMountPointW
GetModuleHandleA
HeapAlloc
GetLocaleInfoA
GetComputerNameA
GetCurrentProcessId
CreateNamedPipeA
EnumResourceLanguagesW
SetHandleInformation
_hwrite
ZombifyActCtx
DeleteVolumeMountPointA
ReleaseActCtx
WritePrivateProfileStringA
GetUserDefaultLangID
CreateMemoryResourceNotification
WaitForSingleObject
GetLongPathNameW
VerifyVersionInfoA
EnumCalendarInfoA
FindNextFileA
EnumTimeFormatsW
SetLastError
EnumTimeFormatsA
SetCriticalSectionSpinCount
SetStdHandle
WriteConsoleW
LoadLibraryA
GetConsoleAliasW
RaiseException
RtlUnwind
HeapFree
DeleteFileA
HeapSetInformation
GetStartupInfoW
EncodePointer
IsProcessorFeaturePresent
DecodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
HeapCreate
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
ExitProcess
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
Sleep
HeapSize
WideCharToMultiByte
LoadLibraryW
LCMapStringW
MultiByteToWideChar
GetStringTypeW
HeapReAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
CloseHandle
CreateFileW
user32
GetComboBoxInfo
advapi32
RevertToSelf
Sections
.text Size: 87KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 183KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ