Static task
static1
Behavioral task
behavioral1
Sample
b14c6093ebf544c55a6f3945db86881c61bf06c5b7cb2017c10ce1ef9480460e.exe
Resource
win7-20230220-en
General
-
Target
46b241f63384e8e943b1c0ae780eddd0.bin
-
Size
193KB
-
MD5
d9d8f24eceb86c025bd0f14d8ea467c7
-
SHA1
a3b8ab706f21dd83fd572ed06af3e6a2ce1e3f62
-
SHA256
5c2f383ed48b904a6277f2cc49ae81a6399ab15137f2a0a8ab26ab065ca77e95
-
SHA512
ed18a7f2d04b617f299df4c417e5f162ab845742c19310d27ac8d65c58303dddbad0f53cb5a04a4ed8fde7d3e0599f9c09fc5adc9d96af87cf1c7b48920e3e04
-
SSDEEP
6144:DrHuixcxJMExDTOGiVqks4vdXXmXdke34aHn:DLGxuExXOPrs8gdN4Sn
Malware Config
Signatures
Files
-
46b241f63384e8e943b1c0ae780eddd0.bin.zip
Password: infected
-
b14c6093ebf544c55a6f3945db86881c61bf06c5b7cb2017c10ce1ef9480460e.exe.exe windows x64
Password: infected
57b146c278fb2ac0214007b236451fbd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
LoadLibraryA
GetProcAddress
FreeLibrary
CreateDirectoryW
GetVolumeInformationW
FindFirstFileW
FindNextFileW
ExpandEnvironmentStringsW
GetModuleFileNameW
GetEnvironmentVariableW
CreateMutexW
FindClose
GetFileAttributesW
Sleep
GetLastError
CloseHandle
lstrlenA
GetComputerNameW
CreateProcessW
CopyFileW
lstrcpyW
lstrcmpW
MultiByteToWideChar
ReadFile
WriteFile
RemoveDirectoryW
GetTempPathW
CreateFileW
DeleteFileW
GetFileSize
WideCharToMultiByte
WriteConsoleW
HeapSize
SetEndOfFile
ExitProcess
lstrlenW
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
ReadConsoleW
SetFilePointerEx
GetFileSizeEx
HeapReAlloc
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
GetTimeZoneInformation
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
HeapFree
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
LCMapStringEx
GetCPInfo
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
RaiseException
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetFileType
SetFileTime
TzSpecificLocalTimeToSystemTime
SystemTimeToFileTime
GetModuleHandleExW
GetStdHandle
HeapAlloc
user32
wsprintfW
advapi32
GetUserNameW
shell32
ShellExecuteW
ole32
StringFromGUID2
ws2_32
socket
bind
inet_addr
listen
closesocket
wininet
InternetCloseHandle
InternetSetOptionW
InternetReadFile
InternetOpenW
InternetQueryDataAvailable
InternetQueryOptionW
HttpOpenRequestW
InternetConnectW
HttpSendRequestW
InternetCrackUrlW
urlmon
ObtainUserAgentString
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
shlwapi
wnsprintfW
StrCmpNIW
StrNCatW
PathCombineW
wnsprintfA
StrCmpNA
Sections
.text Size: 256KB - Virtual size: 255KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 91KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ