Static task
static1
Behavioral task
behavioral1
Sample
265fb8ad935504f6f91d2c7e177a70d766dd037f9137f1d0657eeb155c829886.exe
Resource
win7-20230220-en
General
-
Target
b9e6e8948db9bc7f6d70cfb6f75cbeef.bin
-
Size
286KB
-
MD5
edec98fa50ba9a7bc2d5e12f1545352f
-
SHA1
716cebc4547142d4766b95f4a129fabd10cc58a6
-
SHA256
b6b23273418bb2b9ef615d713e3c35ea3eb23d398107acd2d31286989daa2d6e
-
SHA512
19c934cf8aea5c70425e84714e3b8bab7b4e81a501b20347a8ab0c287c777b578e5686d0f3bcc6ef34f981ed7e5763b3a21844d12ed29b312a91e26d7ca70460
-
SSDEEP
6144:WNGRwK/x+LBYoRnUlIEQ4i/9cpCIlbb3dvAG2JWK7AtOtgR:WjK/x6BYqmIEQ4izcbNvAG2JWcA7R
Malware Config
Signatures
Files
-
b9e6e8948db9bc7f6d70cfb6f75cbeef.bin.zip
Password: infected
-
265fb8ad935504f6f91d2c7e177a70d766dd037f9137f1d0657eeb155c829886.exe.exe windows x64
Password: infected
cb238ad11edc9989f023bcce9f933e46
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
kernel32
HeapFree
GetProcessHeap
LoadLibraryW
FreeLibrary
GetLastError
GetProcAddress
HeapSetInformation
LocalFree
ExpandEnvironmentStringsW
GetCommandLineW
GetFileAttributesW
ResolveDelayLoadedAPI
DelayLoadFailureHook
LocalAlloc
IsDBCSLeadByte
RegisterApplicationRestart
HeapAlloc
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleW
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoW
Sleep
gdi32
GetStockObject
user32
LoadStringW
LoadIconW
CreateWindowExW
MessageBoxW
RegisterClassW
DefWindowProcW
PostQuitMessage
LoadCursorW
msvcrt
_acmdln
__C_specific_handler
_initterm
__setusermatherr
_ismbblead
_cexit
_exit
exit
__set_app_type
__getmainargs
_amsg_exit
_XcptFilter
_fmode
_commode
?terminate@@YAXXZ
memset
memcpy
ntdll
RtlLookupFunctionEntry
RtlCaptureContext
RtlVirtualUnwind
shell32
CommandLineToArgvW
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 372B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 488KB - Virtual size: 492KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 636B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ