Static task
static1
Behavioral task
behavioral1
Sample
0402de5726d703c8ef92781653437a6fbd38c83889fdd14e74aacf8a065ecbe2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0402de5726d703c8ef92781653437a6fbd38c83889fdd14e74aacf8a065ecbe2.exe
Resource
win10v2004-20221111-en
General
-
Target
bcc869024c8af0a176c0e35c6548be90.bin
-
Size
222KB
-
MD5
6d23201bd9f83a7638b75fad3bdf0082
-
SHA1
80fdc709f4190ffe06cfe1012b5b8308523139a0
-
SHA256
af61ec38afa95640e68ca787e302de8122e50174fbb3cca66587df1b5fce3218
-
SHA512
9ff10c24eabc6cd99797cd9f1cf4bd15c6b1e1fa0f469715dc5e04d50b20d49162482b74814a129020a3fcaf1c4a368509959f6ea181c8482a6a6aad86525a0d
-
SSDEEP
6144:AyGnhYJCNoSj29533RwEr4iDKcIj07DVscUuk:AyweSaX33OsRDKcIj078
Malware Config
Signatures
Files
-
bcc869024c8af0a176c0e35c6548be90.bin.zip
Password: infected
-
0402de5726d703c8ef92781653437a6fbd38c83889fdd14e74aacf8a065ecbe2.exe.exe windows x86
Password: infected
d65ef0c2fa9b2ff4fcd0a10cf0acdf4b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameW
GetModuleHandleW
GetTickCount
GetNumberFormatA
GetGeoInfoW
GlobalAlloc
LoadLibraryW
ReadConsoleInputA
GetPrivateProfileStructW
GetBinaryTypeW
GetTempPathW
OpenMutexW
GetLastError
InterlockedIncrement
GetProcAddress
VirtualAlloc
BuildCommDCBW
GetProcessWorkingSetSize
AddAtomW
GetCommMask
FoldStringW
GetCurrentProcessId
LCMapStringW
GetLocaleInfoW
WriteConsoleOutputCharacterA
SetLastError
SetLocaleInfoA
LoadLibraryA
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
RtlUnwind
RaiseException
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
GetCPInfo
HeapAlloc
HeapCreate
VirtualFree
HeapReAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
HeapSize
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
InitializeCriticalSectionAndSpinCount
user32
LoadMenuA
GetMenuInfo
advapi32
DeregisterEventSource
ReportEventA
winhttp
WinHttpCheckPlatform
Sections
.text Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 486KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xapeni Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.mokim Size: 1024B - Virtual size: 723B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 192KB - Virtual size: 192KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ