Static task
static1
Behavioral task
behavioral1
Sample
acb8f96514552656fedf4243d39b014599d9794562b6337366afedfe6aca30ea.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
acb8f96514552656fedf4243d39b014599d9794562b6337366afedfe6aca30ea.exe
Resource
win10v2004-20230220-en
General
-
Target
acb8f96514552656fedf4243d39b014599d9794562b6337366afedfe6aca30ea.zip
-
Size
129KB
-
MD5
7753dfba6a553ea6c352477b21fe9588
-
SHA1
640e2176c297f8699bb75cf1aef8546acf6cd48a
-
SHA256
46b1ca9c43bc7d3275ea8d0ffd9a3cb001c0be7b92378d1add5d14f6f77a2109
-
SHA512
985f38e0ae5f41a40ab6823642af2d336728420b7487ca24fc82b1523e7c2362b22a8b4d1687232d1083f590bca43381ac621809c86182f8c97efbce3a500e24
-
SSDEEP
3072:pYJaXBdPE8hDnUNqdp0Z0oZq0g1rF0ugYCuvWoCI/5gm:pkavd1nUNoQpZqJoxYCuvrCqgm
Malware Config
Signatures
Files
-
acb8f96514552656fedf4243d39b014599d9794562b6337366afedfe6aca30ea.zip.zip
Password: infected
-
acb8f96514552656fedf4243d39b014599d9794562b6337366afedfe6aca30ea.exe.exe windows x86
Password: infected
4054b693d3c05398378812172a4ea0e8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReleaseMutex
ReadConsoleInputW
VerifyVersionInfoW
GetCPInfoExW
CreateEventW
SetLocaleInfoA
GetProcAddress
GlobalAlloc
DeleteFileA
EnumResourceTypesW
GetBinaryTypeA
SetLastError
LocalFlags
WriteProfileStringW
GetComputerNameExA
GetConsoleAliasA
WriteProfileSectionW
SetSystemPowerState
FindFirstVolumeMountPointW
GetModuleHandleW
EnumResourceLanguagesA
SetDefaultCommConfigW
EnumTimeFormatsA
GetCurrentActCtx
DeleteVolumeMountPointW
GetStartupInfoW
IsProcessInJob
WritePrivateProfileStringA
FoldStringA
GetShortPathNameA
FindNextFileA
EnumCalendarInfoW
LocalAlloc
CreateEventA
GetLastError
RtlCaptureContext
GetStringTypeExA
GetWindowsDirectoryA
SetVolumeMountPointA
LoadLibraryA
DecodePointer
EncodePointer
GetCommandLineW
HeapSetInformation
IsProcessorFeaturePresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
SetFilePointer
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
ExitProcess
WriteFile
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RaiseException
HeapFree
Sleep
RtlUnwind
SetStdHandle
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LoadLibraryW
LCMapStringW
MultiByteToWideChar
GetStringTypeW
HeapAlloc
HeapReAlloc
WriteConsoleW
HeapSize
CloseHandle
CreateFileW
gdi32
GetBoundsRect
advapi32
GetKernelObjectSecurity
Sections
.text Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 77KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ