Static task
static1
Behavioral task
behavioral1
Sample
8b08628b3b7ad95bef5be23120ed741dcfca5d30f0d2dfdf83166b94c56f15d1.exe
Resource
win7-20230220-en
General
-
Target
04ca884d1642ba6051f501ca5c66375a.bin
-
Size
267KB
-
MD5
9a7d633bd1dd414eb3c099b702b3b1c0
-
SHA1
ad69bfe67ca25eb0072aec871991c95b828ef3fb
-
SHA256
33b53550bdc268414f4cbb969f694e5a81557308dc3237a855241edc8af69e71
-
SHA512
41ff6e4900f4a04526e3f922f18e1579ef9dfba17a7032f30d76a0f7e1cc36f607145f20aaef7736095c1ba0aea39f16c26513b7971bcb4fa7092eaefd4e9fb2
-
SSDEEP
6144:eSA8Iz7oN5q0fjXDK/5Jjb8b7FE8Bubqh39gyXsujCuqu6kmJh0DqY9gw5WmOHm:eSZK7oNXD+LH8tAmhtgy+u2u9gw5WmOG
Malware Config
Signatures
Files
-
04ca884d1642ba6051f501ca5c66375a.bin.zip
Password: infected
-
8b08628b3b7ad95bef5be23120ed741dcfca5d30f0d2dfdf83166b94c56f15d1.exe.exe windows x86
Password: infected
2ff441a58ff638ca2d2b64ce6ffa9559
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateJobObjectW
GetModuleHandleExW
FreeEnvironmentStringsA
GetModuleHandleW
FindNextVolumeMountPointA
GetConsoleAliasesA
FormatMessageA
SetHandleCount
FindResourceExA
GlobalAlloc
GetConsoleAliasExesLengthW
GetFileAttributesA
WriteConsoleW
GetBinaryTypeA
GetStringTypeExA
EnumSystemLocalesA
SetLastError
GetProcAddress
VirtualAlloc
LoadLibraryA
CreateSemaphoreW
InterlockedExchangeAdd
WriteProfileSectionW
EnumDateFormatsA
GetStringTypeW
RequestWakeupLatency
GetVersionExA
LocalSize
FindAtomW
GetWindowsDirectoryW
GetPrivateProfileSectionW
DebugBreak
CloseHandle
CreateFileA
GetConsoleOutputCP
WriteConsoleA
EndUpdateResourceW
OpenJobObjectA
LockFileEx
Sleep
ExitProcess
GetStartupInfoW
HeapAlloc
GetLastError
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
WriteFile
GetStdHandle
GetModuleFileNameA
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleHandleA
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetStdHandle
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RtlUnwind
HeapSize
GetLocaleInfoA
RaiseException
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
user32
LoadIconW
LoadMenuW
RedrawWindow
CharLowerBuffA
GetSysColorBrush
GetMenuInfo
GetCaretBlinkTime
gdi32
GetTextExtentPointI
advapi32
ReportEventW
Sections
.text Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 260KB - Virtual size: 39.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ