Static task
static1
Behavioral task
behavioral1
Sample
34c1121937c35b39b654428cf3fc6b16e3e2eed03c1ccbcfc77183d1749ebadc.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
34c1121937c35b39b654428cf3fc6b16e3e2eed03c1ccbcfc77183d1749ebadc.exe
Resource
win10v2004-20230220-en
General
-
Target
b8b2b5361031ed8136002403ec3bc357.bin
-
Size
44KB
-
MD5
3397e75eefe72d3fd3fe0b6779077fc6
-
SHA1
33ff326f8eee3baf4c61deb83d44b1e00ddc1bc0
-
SHA256
a347d7eb111f615503ffd8108e1573b6d0bfd19711c245686b5eb41f5c85c189
-
SHA512
92f8245afe848c75d1d3aae3dca7d82f73ce49e9ed38baca7c5aee3659b8d1d0a3291e7971a6e46e4cec4752a4219f95232980f1456e7b557c3945e912764818
-
SSDEEP
768:qKiPwoX8dIKWpUMJwLvmmxqDi4NvrvovhWxCoGfkTZwi9dbETf7wMN:qKiPwoX8dIdUMOxxq+4NzwpWxYcTxTbq
Malware Config
Signatures
Files
-
b8b2b5361031ed8136002403ec3bc357.bin.zip
Password: infected
-
190efd8437c972b5dc4c9d51ee099d3c9a59f90c12b5aeb742744ab8f733adf1.zip.zip
Password: infected
-
34c1121937c35b39b654428cf3fc6b16e3e2eed03c1ccbcfc77183d1749ebadc.exe.exe windows x86
Password: infected
e6984e72559f94ba7deb365bcd2bee8a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mpr
WNetOpenEnumW
WNetEnumResourceW
WNetCloseEnum
ws2_32
htonl
kernel32
WaitForMultipleObjects
CloseHandle
CreateThread
SetEvent
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
ResetEvent
CreateEventW
DeleteCriticalSection
CreateMutexW
CreateProcessW
GetCurrentProcess
SetHandleInformation
OpenProcess
GetLocaleInfoW
TerminateProcess
OpenMutexW
GetProcAddress
Process32FirstW
GetExitCodeThread
CreatePipe
CreateFileW
GetModuleHandleA
CreateToolhelp32Snapshot
ReleaseMutex
GetVersion
GetVolumeInformationW
ExpandEnvironmentStringsW
GetModuleFileNameW
FindClose
FindNextFileW
FindFirstFileW
SetEndOfFile
SetFilePointerEx
GetFileAttributesW
ReadFile
GetFileSizeEx
MoveFileW
DeleteFileW
SetFileAttributesW
IsDebuggerPresent
CopyFileW
Sleep
TerminateThread
HeapSize
WriteFile
GetTickCount
GetLogicalDrives
GetComputerNameW
WaitForSingleObject
LoadLibraryW
MultiByteToWideChar
RtlUnwind
Process32NextW
UnhandledExceptionFilter
GetSystemTimeAsFileTime
GetLastError
HeapFree
HeapAlloc
HeapReAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
HeapCreate
GetModuleHandleW
ExitProcess
DecodePointer
GetStdHandle
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
IsProcessorFeaturePresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
GetStringTypeW
SetUnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
user32
GetShellWindow
GetWindowThreadProcessId
advapi32
DuplicateTokenEx
CryptDecrypt
CryptDestroyKey
CryptEncrypt
CryptImportKey
CryptGenRandom
CryptSetKeyParam
CryptAcquireContextW
RegSetValueExW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
GetTokenInformation
OpenProcessToken
shell32
ShellExecuteExW
Sections
.text Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.cdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE