Static task
static1
Behavioral task
behavioral1
Sample
d05a67845680af53a1efe0d852aa7ab85ad97e76cc8aaa62b1aad70288665026.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d05a67845680af53a1efe0d852aa7ab85ad97e76cc8aaa62b1aad70288665026.exe
Resource
win10v2004-20220812-en
General
-
Target
d05a67845680af53a1efe0d852aa7ab85ad97e76cc8aaa62b1aad70288665026.zip
-
Size
710KB
-
MD5
ad8a7c5a69347d3c75945f3081f0cc76
-
SHA1
c4be6e837d915754c048989f48c89e2921f4923b
-
SHA256
48d5dc103677fe4f0c071a50072f90e270501d764912963a567b39e805b4b0c7
-
SHA512
8a90486f637b6c86f4bbe02e733e57abcb40ef33047be72812e596f8d43a6fcb73b713c03700c2087c20f2d4c42fa965ad9e0c6a7ccc70869053ef8becf22f5e
-
SSDEEP
12288:sk//l3v2TPUjDNdHLGKv1RUGsBqF1X0qCzPPyRt9qTlCu1ovXwUgarV8OiIMz/5b:NO2hdHLzkGNKbziRXqTlCu1AAUOO7whb
Malware Config
Signatures
Files
-
d05a67845680af53a1efe0d852aa7ab85ad97e76cc8aaa62b1aad70288665026.zip.zip
Password: infected
-
d05a67845680af53a1efe0d852aa7ab85ad97e76cc8aaa62b1aad70288665026.exe windows x86
Password: infected
ac60a8dcc69324c92e3ea84189250edd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DebugActiveProcess
DeleteVolumeMountPointA
EndUpdateResourceW
ReadConsoleA
GetNumberOfConsoleMouseButtons
GetComputerNameW
SetThreadExecutionState
FreeEnvironmentStringsA
GetTickCount
TlsSetValue
LoadLibraryW
GetConsoleAliasW
WriteConsoleW
LCMapStringA
InterlockedExchange
SetLastError
GetProcAddress
VirtualAlloc
ResetEvent
LoadLibraryA
GetProcessWorkingSetSize
SetConsoleDisplayMode
LockResource
SetCommMask
GetModuleHandleA
OpenFileMappingW
GetCurrentThreadId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleW
Sleep
ExitProcess
GetStartupInfoW
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
GetLastError
WriteFile
GetStdHandle
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsFree
InterlockedIncrement
InterlockedDecrement
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
MultiByteToWideChar
RtlUnwind
HeapSize
GetLocaleInfoA
WideCharToMultiByte
RaiseException
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LCMapStringW
GetStringTypeA
GetStringTypeW
CloseHandle
WriteConsoleA
GetConsoleOutputCP
SetFilePointer
SetStdHandle
CreateFileA
user32
WindowFromDC
Sections
.text Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 609KB - Virtual size: 621KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 155KB - Virtual size: 154KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ