Static task
static1
Behavioral task
behavioral1
Sample
9c48e1bb555bbb98d635146b5098f1fda8753eade8479c079a14a5a1887fde7e.exe
Resource
win7-20230220-en
General
-
Target
9c48e1bb555bbb98d635146b5098f1fda8753eade8479c079a14a5a1887fde7e.zip
-
Size
217KB
-
MD5
3fd0bdaa2891b4f09e28439fe4aa3b6c
-
SHA1
120fc5ec7bf0bd57ec98950ca493c7f7283d1948
-
SHA256
2bf70e55addbe857adcf18e7166cc67e3f26cd450cbaa0d5c2df57f029be517f
-
SHA512
1b26df240b4d5febcb0bf85e002104be99b10e70faacad29a88b83a1c69428e6381dc5116472ca314edadba1c166a109f4b75e9915d479aae461b58729b083e3
-
SSDEEP
6144:BXTi+XFdOn8/8IGxdCzAmWcgPGkuluXpXRC5:BjiSd0O8xx8zAmWZPHXM5
Malware Config
Signatures
Files
-
9c48e1bb555bbb98d635146b5098f1fda8753eade8479c079a14a5a1887fde7e.zip.zip
Password: infected
-
9c48e1bb555bbb98d635146b5098f1fda8753eade8479c079a14a5a1887fde7e.exe.exe windows x86
Password: infected
e9c643cceae7055a779148055496663d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
GetConsoleAliasesA
FormatMessageA
SetHandleCount
FindResourceExA
GlobalAlloc
GetConsoleAliasExesLengthW
GetVersionExW
GetFileAttributesA
CreateSemaphoreA
SetConsoleCursorPosition
WriteConsoleW
GetBinaryTypeW
FindNextVolumeMountPointW
GetStringTypeExA
LCMapStringA
EnumSystemLocalesA
SetLastError
GetProcAddress
VirtualAlloc
LockFileEx
LoadLibraryA
InterlockedExchangeAdd
OpenJobObjectW
FindAtomA
EnumDateFormatsA
FreeEnvironmentStringsW
GetPrivateProfileSectionA
GetStringTypeW
RequestWakeupLatency
LocalSize
GetWindowsDirectoryW
CloseHandle
CreateFileA
GetConsoleOutputCP
WriteConsoleA
RaiseException
EndUpdateResourceW
WriteProfileSectionA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
MultiByteToWideChar
GetStartupInfoW
Sleep
ExitProcess
GetLastError
WriteFile
GetStdHandle
GetModuleFileNameA
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapAlloc
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
WideCharToMultiByte
LCMapStringW
GetStringTypeA
GetLocaleInfoA
GetModuleHandleA
HeapReAlloc
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RtlUnwind
HeapSize
user32
DestroyAcceleratorTable
LoadIconA
LoadMenuW
RedrawWindow
CharLowerBuffA
GetSysColorBrush
GetMenuInfo
GetCaretBlinkTime
gdi32
GetTextExtentPointI
advapi32
ReportEventA
Sections
.text Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 161KB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ