Static task
static1
Behavioral task
behavioral1
Sample
50302a76db54396b6775562edd8a67932ffa653cbdc40ce17910278f51f80db0.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
50302a76db54396b6775562edd8a67932ffa653cbdc40ce17910278f51f80db0.exe
Resource
win10v2004-20230220-en
General
-
Target
50302a76db54396b6775562edd8a67932ffa653cbdc40ce17910278f51f80db0.zip
-
Size
140KB
-
MD5
be8d9c9ce7ec5862e71431713971b74c
-
SHA1
7f7573d29ac2c750e3e4933fc1c837dd38ff3541
-
SHA256
fd11fb4145987d097b8eaa3c11277e7e73608f1336e9522de43f0d71c713da84
-
SHA512
cbe71e4ab08a38c7da8b6323fd5bd6d9485c0ce5aa9ed6d9b2b2d42554fed75bd6196050ed2c73a266069e5b30823c681a33618ef683568b7e1031b535628dee
-
SSDEEP
3072:qly7wcogNs9tFtwEDF6rd41hjUrM6IYbZXuq61DhfBRiIF8Kag/:qwcc9Ns3wEDmdGhjUrM6ImZj01R/
Malware Config
Signatures
Files
-
50302a76db54396b6775562edd8a67932ffa653cbdc40ce17910278f51f80db0.zip.zip
Password: infected
-
50302a76db54396b6775562edd8a67932ffa653cbdc40ce17910278f51f80db0.exe.exe windows x86
Password: infected
4453019f24fbdf41dd3a4f06fe73134e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleAliasExesLengthA
DeleteVolumeMountPointA
OpenJobObjectA
CreateJobObjectW
QueryDosDeviceA
GetProcessPriorityBoost
GetModuleHandleW
EscapeCommFunction
GetNumberFormatA
GetWindowsDirectoryA
Sleep
GetStringTypeExW
GlobalFlags
GetFileAttributesW
GetThreadPriorityBoost
GetBinaryTypeW
FindNextVolumeMountPointW
GetConsoleAliasesW
GetLastError
SetLastError
GetProcAddress
VirtualAlloc
GetModuleHandleExA
WriteProfileSectionA
LoadLibraryA
CreateSemaphoreW
WriteConsoleA
InterlockedExchangeAdd
LocalAlloc
GetOEMCP
GetModuleHandleA
FreeEnvironmentStringsW
GetStringTypeW
EnumDateFormatsW
EndUpdateResourceA
GetVersionExA
FindAtomW
GetWindowsDirectoryW
CloseHandle
CreateFileA
RaiseException
WriteConsoleW
GetConsoleOutputCP
LocalUnlock
HeapFree
ExitProcess
GetStartupInfoW
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapAlloc
HeapReAlloc
SetFilePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
WriteFile
GetStdHandle
GetModuleFileNameA
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
GetCPInfo
GetACP
IsValidCodePage
SetStdHandle
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapSize
GetLocaleInfoA
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
user32
LoadIconA
CopyAcceleratorTableA
LoadMenuW
CharLowerBuffA
GetSysColorBrush
GetMenuInfo
SetCaretPos
GetCaretBlinkTime
advapi32
ReportEventW
Sections
.text Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 140KB - Virtual size: 39.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ