Static task
static1
Behavioral task
behavioral1
Sample
1430ef775b65caef8cc9c772dbb7ea8b841306e0c7b12fc94869b1380d01c3f1.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1430ef775b65caef8cc9c772dbb7ea8b841306e0c7b12fc94869b1380d01c3f1.exe
Resource
win10v2004-20230220-en
General
-
Target
dfb0833ee43a895b4475b4df229253bf.bin
-
Size
232KB
-
MD5
104da208c66875531ddd14b3e40134c9
-
SHA1
ae3c98831cfea37dd154fc6857fb08228c346382
-
SHA256
fb9023b0d2bb00c7b184de8d1c0f4d07ec1e13fea59381833692bf8c3590faa1
-
SHA512
d6d849b95d3cf2ea9b259300df2bdebc455df79fba1137f070f0600b9075fc151cbce03acb25cb83d4082785720949b77be0fe90583db49c91d353a3c749d923
-
SSDEEP
6144:N6iONidkX/uUUpaLuTqJ+HRBVg6zhbHn4pgHxcIbt:NpO3JUpCUqYHRXgyhLkgHCet
Malware Config
Signatures
Files
-
dfb0833ee43a895b4475b4df229253bf.bin.zip
Password: infected
-
1430ef775b65caef8cc9c772dbb7ea8b841306e0c7b12fc94869b1380d01c3f1.exe.exe windows x86
Password: infected
8f077cc2038fae85c4e9d8c60b51a269
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFirmwareEnvironmentVariableW
GetCPInfoExA
CreateEventW
GetSystemDirectoryW
GetProcAddress
GlobalAlloc
SetDefaultCommConfigA
OpenWaitableTimerA
GetFileAttributesA
EnumResourceTypesW
WriteFileGather
GetModuleHandleW
CreateTimerQueue
InterlockedCompareExchange
LocalFlags
GlobalLock
GetConsoleAliasW
WritePrivateProfileSectionA
GetCurrentThreadId
ReadConsoleInputW
SleepEx
lstrcmpW
SetCalendarInfoA
GetSystemWindowsDirectoryA
GetConsoleAliasExesW
EnumTimeFormatsW
AddAtomA
GetExitCodeThread
_llseek
FindNextFileW
CopyFileA
GetShortPathNameW
EnumCalendarInfoA
EnumCalendarInfoExA
CreateActCtxA
FindFirstVolumeMountPointA
PulseEvent
SetLastError
LoadLibraryA
GetLastError
HeapReAlloc
HeapAlloc
MoveFileA
DeleteFileA
GetCommandLineA
HeapSetInformation
GetStartupInfoW
IsProcessorFeaturePresent
EncodePointer
DecodePointer
HeapCreate
HeapFree
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LoadLibraryW
Sleep
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
MultiByteToWideChar
HeapSize
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LCMapStringW
GetStringTypeW
ReadFile
SetFilePointer
CloseHandle
WriteConsoleW
SetStdHandle
CreateFileW
user32
LoadMenuW
DefDlgProcA
GetListBoxInfo
gdi32
GetCharWidth32A
advapi32
LookupAccountSidW
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 182KB - Virtual size: 683KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ