Static task
static1
Behavioral task
behavioral1
Sample
94551b68fcb65d49a5d1d29a0dba5ec3f2e98252fef337a4fba2416ecb8cea76.exe
Resource
win7-20230220-en
General
-
Target
94551b68fcb65d49a5d1d29a0dba5ec3f2e98252fef337a4fba2416ecb8cea76.zip
-
Size
218KB
-
MD5
62d17613733fa13fa3a9c4220a092b15
-
SHA1
d061b347bc68a28c5ed900bb3cc25b69b3ef6b4c
-
SHA256
995217d74a396e998546e4a9c5127900d423b4c9c349b5f9f8dba898b7fa139f
-
SHA512
e7dbb025fcea94d19755f64eac4f2f87aeee301d15a6eb668c86e865441adb00d2dc5ee3c356d46b27509395859bc0e8dc62651afbd530fc68be634cfacc899c
-
SSDEEP
6144:asQWH5iNe8B0J3EKU+kp2y+B7duQHLi4B98:0Qkkm0J15wf024B2
Malware Config
Signatures
Files
-
94551b68fcb65d49a5d1d29a0dba5ec3f2e98252fef337a4fba2416ecb8cea76.zip.zip
Password: infected
-
94551b68fcb65d49a5d1d29a0dba5ec3f2e98252fef337a4fba2416ecb8cea76.exe.exe windows x86
Password: infected
8fae7a7705d344fefbbe3d51a799fab4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateJobObjectW
GetModuleHandleExW
FreeEnvironmentStringsA
GetModuleHandleW
FindNextVolumeMountPointA
GetConsoleAliasesA
FormatMessageA
SetHandleCount
FindResourceExA
GlobalAlloc
GetConsoleAliasExesLengthW
GetFileAttributesA
SetConsoleCursorPosition
WriteConsoleW
GetBinaryTypeA
GetStringTypeExA
LCMapStringA
EnumSystemLocalesA
SetLastError
GetProcAddress
VirtualAlloc
LockFileEx
LoadLibraryA
CreateSemaphoreW
InterlockedExchangeAdd
WriteProfileSectionW
EnumDateFormatsA
GetStringTypeW
RequestWakeupLatency
GetVersionExA
LocalSize
FindAtomW
GetWindowsDirectoryW
GetPrivateProfileSectionW
DebugBreak
CloseHandle
CreateFileA
GetConsoleOutputCP
WriteConsoleA
EndUpdateResourceW
OpenJobObjectA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
Sleep
ExitProcess
GetLastError
WriteFile
GetStdHandle
GetModuleFileNameA
HeapAlloc
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
GetModuleHandleA
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetStdHandle
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RtlUnwind
HeapSize
GetLocaleInfoA
RaiseException
MultiByteToWideChar
LCMapStringW
GetStringTypeA
user32
LoadIconW
LoadMenuW
RedrawWindow
CharLowerBuffA
GetSysColorBrush
GetMenuInfo
GetCaretBlinkTime
gdi32
GetTextExtentPointI
advapi32
ReportEventW
Sections
.text Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 160KB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ