Static task
static1
Behavioral task
behavioral1
Sample
c5f55cbe14f7240b125ef2389705e49c4d5693b69f95292581a7e4d8e11a54e7.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c5f55cbe14f7240b125ef2389705e49c4d5693b69f95292581a7e4d8e11a54e7.exe
Resource
win10v2004-20230220-en
General
-
Target
eb6dc856d1b93c13c045766dcb3a1bdd.bin
-
Size
243KB
-
MD5
5abe14f84347df206dc0034dc0e4e9d7
-
SHA1
b9da2107efebd8d1f3b8c63cd90a3bf2900b0186
-
SHA256
e8c97c79f7e903fdce3122934d81a6a74970cbe29c2339b29f7e9fca00f37c71
-
SHA512
e3f4684a95412f7d9876f7ff943bfeb17ceda040b397a96ff1fb97f6a940c45f90f3e181218d5d6f854635db88341501321479247531a824d9b324d113418f0d
-
SSDEEP
3072:SCYl/DU20gEER56FpQFrOiydIMTlhJHw8344RsMQgpV97w5Wzm9wi4629kkOSAn:SCADUCZRAuFidIMTrC4OMQ+vowvKk2n
Malware Config
Signatures
Files
-
eb6dc856d1b93c13c045766dcb3a1bdd.bin.zip
Password: infected
-
c5f55cbe14f7240b125ef2389705e49c4d5693b69f95292581a7e4d8e11a54e7.exe.exe windows x86
Password: infected
1b4776cba51be1c4a57ae3dee975e7f0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
GetConsoleAliasesA
FormatMessageA
SetHandleCount
FindResourceExA
GlobalAlloc
GetConsoleAliasExesLengthW
GetVersionExW
GetFileAttributesA
CreateSemaphoreA
SetConsoleCursorPosition
WriteConsoleW
GetBinaryTypeW
FindNextVolumeMountPointW
GetStringTypeExA
LCMapStringA
EnumSystemLocalesA
SetLastError
GetProcAddress
VirtualAlloc
LockFileEx
LoadLibraryA
InterlockedExchangeAdd
OpenJobObjectW
FindAtomA
EnumDateFormatsA
FreeEnvironmentStringsW
GetPrivateProfileSectionA
GetStringTypeW
RequestWakeupLatency
LocalSize
GetWindowsDirectoryW
CloseHandle
CreateFileA
GetConsoleOutputCP
WriteConsoleA
RaiseException
EndUpdateResourceW
WriteProfileSectionA
MultiByteToWideChar
Sleep
ExitProcess
GetStartupInfoW
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
GetLastError
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
WriteFile
GetStdHandle
GetModuleFileNameA
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
WideCharToMultiByte
LCMapStringW
GetStringTypeA
GetLocaleInfoA
GetModuleHandleA
HeapReAlloc
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RtlUnwind
HeapSize
user32
DestroyAcceleratorTable
LoadIconA
LoadMenuW
RedrawWindow
CharLowerBuffA
GetSysColorBrush
GetMenuInfo
GetCaretBlinkTime
gdi32
GetTextExtentPointI
advapi32
ReportEventA
Sections
.text Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 235KB - Virtual size: 39.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ