Static task
static1
Behavioral task
behavioral1
Sample
cb04d5432bc4d8aab459870e3c221d6aebcbd14fad9a797e2a058ddfbd0e2fca.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
cb04d5432bc4d8aab459870e3c221d6aebcbd14fad9a797e2a058ddfbd0e2fca.exe
Resource
win10v2004-20230221-en
General
-
Target
8c453de865d8e5c6af8d9f0ccb13620f.bin
-
Size
243KB
-
MD5
c4b0d066536d01132f2a45ba4cd09d02
-
SHA1
a0b477f40349235651a168ffc90dd63a13ddbe97
-
SHA256
bf4a49f9837298cb288f29eaa7a781c840ab8fc94fb6d8daa68eda044f85e1e2
-
SHA512
9ad9c5cfe093f0694f2300762fc40852b23d4fd07030fb2cac780d1bee9e0f587f4a30716f9e5b487706fe64db25dc6d192b720871937377e2b8736a29637001
-
SSDEEP
6144:qv5ROvyXk5QYLfhFnar//JdpuQ0qang3/:gQphPar//J+GIg3/
Malware Config
Signatures
Files
-
8c453de865d8e5c6af8d9f0ccb13620f.bin.zip
Password: infected
-
cb04d5432bc4d8aab459870e3c221d6aebcbd14fad9a797e2a058ddfbd0e2fca.exe.exe windows x86
Password: infected
2ff441a58ff638ca2d2b64ce6ffa9559
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateJobObjectW
GetModuleHandleExW
FreeEnvironmentStringsA
GetModuleHandleW
FindNextVolumeMountPointA
GetConsoleAliasesA
FormatMessageA
SetHandleCount
FindResourceExA
GlobalAlloc
GetConsoleAliasExesLengthW
GetFileAttributesA
WriteConsoleW
GetBinaryTypeA
GetStringTypeExA
EnumSystemLocalesA
SetLastError
GetProcAddress
VirtualAlloc
LoadLibraryA
CreateSemaphoreW
InterlockedExchangeAdd
WriteProfileSectionW
EnumDateFormatsA
GetStringTypeW
RequestWakeupLatency
GetVersionExA
LocalSize
FindAtomW
GetWindowsDirectoryW
GetPrivateProfileSectionW
DebugBreak
CloseHandle
CreateFileA
GetConsoleOutputCP
WriteConsoleA
EndUpdateResourceW
OpenJobObjectA
LockFileEx
Sleep
ExitProcess
GetStartupInfoW
HeapAlloc
GetLastError
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
WriteFile
GetStdHandle
GetModuleFileNameA
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleHandleA
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetStdHandle
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RtlUnwind
HeapSize
GetLocaleInfoA
RaiseException
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
user32
LoadIconW
LoadMenuW
RedrawWindow
CharLowerBuffA
GetSysColorBrush
GetMenuInfo
GetCaretBlinkTime
gdi32
GetTextExtentPointI
advapi32
ReportEventW
Sections
.text Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 236KB - Virtual size: 39.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ