Static task
static1
Behavioral task
behavioral1
Sample
0ecc034f8f1166be076eb73a1d38c772fd179aa0c0978aba75126a308a98702a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0ecc034f8f1166be076eb73a1d38c772fd179aa0c0978aba75126a308a98702a.exe
Resource
win10v2004-20230220-en
General
-
Target
9c820a94cf381f24d83a413e29bd0eab.bin
-
Size
236KB
-
MD5
76710ec7e8673562c04f5f5b11515fb4
-
SHA1
8622b5e202900455252e294dd1a79197540bb982
-
SHA256
ea7e2b2f65b629fcd618879f92e353b70ac81b1ab1b107a272c9d910b1361590
-
SHA512
b54c3b05c2ed8135f217a22bf23b2f362ee97b864d4dfb5436c0681dc523f1b4943295c55068b44918796a6eb0a7423d3c2123b9848c986d7d4ffb7c23c16119
-
SSDEEP
6144:I5b5ohGFQ7kySKh36/WHJT5wAb9TsV4jGJXC71hSI49:4l39yLvT5wiTWC71hA
Malware Config
Signatures
Files
-
9c820a94cf381f24d83a413e29bd0eab.bin.zip
Password: infected
-
0ecc034f8f1166be076eb73a1d38c772fd179aa0c0978aba75126a308a98702a.exe.exe windows x86
Password: infected
e3f9c15c4b3609736f33755744ec1f93
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstVolumeMountPointW
ReleaseMutex
ReadConsoleInputW
VerifyVersionInfoW
GetCPInfoExW
CreateEventW
SetLocaleInfoA
GetProcAddress
LocalAlloc
DeleteFileA
EnumResourceTypesW
GetBinaryTypeA
SetLastError
LocalFlags
WriteProfileStringW
GetComputerNameExA
GetConsoleAliasW
GetWindowsDirectoryA
SetSystemPowerState
SetVolumeMountPointA
GetModuleHandleW
EnumResourceLanguagesW
SetDefaultCommConfigW
EnumDateFormatsA
GetCurrentActCtx
DeleteVolumeMountPointW
GetStartupInfoW
CreateJobSet
WritePrivateProfileStringA
FoldStringA
GetShortPathNameA
EnumCalendarInfoA
EnumCalendarInfoW
FindNextFileA
GetLastError
GetStringTypeExA
WriteConsoleInputW
WriteProfileSectionW
LoadLibraryA
DecodePointer
EncodePointer
GetCommandLineW
HeapSetInformation
IsProcessorFeaturePresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RaiseException
HeapFree
Sleep
RtlUnwind
WideCharToMultiByte
LoadLibraryW
LCMapStringW
MultiByteToWideChar
GetStringTypeW
HeapAlloc
HeapReAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
HeapSize
CloseHandle
WriteConsoleW
SetStdHandle
CreateFileW
gdi32
GetBoundsRect
advapi32
GetKernelObjectSecurity
Sections
.text Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 183KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ