Static task
static1
Behavioral task
behavioral1
Sample
a40141fe394b8fd9c3c9983b4694757cffd3afa644fd8df02f74629212954a01.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a40141fe394b8fd9c3c9983b4694757cffd3afa644fd8df02f74629212954a01.exe
Resource
win10v2004-20230220-en
General
-
Target
c6ff04eb73522bb772885a1c08e684f4.bin
-
Size
148KB
-
MD5
9ea3653b3166dcbbf95dd622e8e6e380
-
SHA1
ccff7740858f71fa0500f2eca4fbe659643b1755
-
SHA256
5f022840a3315d1b450ef9b33ed8e834e2d4e799126b24bf95658a3f1bc6a484
-
SHA512
5af7749e08bb9ec23467f120fe47dd77d936f6cdb3d06940f083be3c880239d646680649065d89bb94fc328ed1d55501f56cdaf658ca69e4a17096fe40c2cd01
-
SSDEEP
3072:99LMW0FqfBvr9hBkY7xGyTt8elxHBGOWWYB4czykCjtGleYnKdcyCT:9P0cx9x70yTtDhBrYNzykCjAleQKsT
Malware Config
Signatures
Files
-
c6ff04eb73522bb772885a1c08e684f4.bin.zip
Password: infected
-
a40141fe394b8fd9c3c9983b4694757cffd3afa644fd8df02f74629212954a01.exe.exe windows x86
Password: infected
a66ab37f013146fbca029fedb3c9defb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeEnvironmentStringsA
GetModuleHandleW
GetConsoleAliasesA
FormatMessageA
GetWindowsDirectoryA
SetHandleCount
FindResourceExA
GlobalAlloc
GetConsoleAliasExesLengthW
GetVersionExW
GetFileAttributesA
SetConsoleCursorPosition
WriteConsoleW
GetBinaryTypeW
FindNextVolumeMountPointW
GetStringTypeExA
LCMapStringA
EnumSystemLocalesA
SetLastError
GetProcAddress
LockFileEx
LoadLibraryA
CreateSemaphoreW
InterlockedExchangeAdd
WriteProfileSectionW
FindAtomA
EnumDateFormatsA
GetStringTypeW
RequestWakeupLatency
LocalSize
GetWindowsDirectoryW
GetPrivateProfileSectionW
CloseHandle
CreateFileA
GetConsoleOutputCP
WriteConsoleA
EndUpdateResourceW
OpenJobObjectA
VirtualAlloc
Sleep
ExitProcess
GetStartupInfoW
HeapAlloc
GetLastError
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
WriteFile
GetStdHandle
GetModuleFileNameA
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleHandleA
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetStdHandle
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RtlUnwind
HeapSize
GetLocaleInfoA
RaiseException
MultiByteToWideChar
LCMapStringW
GetStringTypeA
user32
LoadIconW
LoadMenuW
RedrawWindow
CharLowerBuffA
GetSysColorBrush
GetMenuInfo
GetCaretBlinkTime
gdi32
GetTextExtentPointI
advapi32
ReportEventA
Sections
.text Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 140KB - Virtual size: 39.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ