Static task
static1
Behavioral task
behavioral1
Sample
fb623f4ae4dcaa007cac4365aa3ce13526ae32b94f2d9bfe5bf5b6f6a0e376b8.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
fb623f4ae4dcaa007cac4365aa3ce13526ae32b94f2d9bfe5bf5b6f6a0e376b8.exe
Resource
win10v2004-20230221-en
General
-
Target
fb623f4ae4dcaa007cac4365aa3ce13526ae32b94f2d9bfe5bf5b6f6a0e376b8.zip
-
Size
370KB
-
MD5
ead74e831165c63a7151c0f7622a681a
-
SHA1
4853cb05a88199449ff984d023e6a9717374c422
-
SHA256
4540480117da80ab268159e5ac07dae1e06818b5a17ee2adc7dfe83abec96ef1
-
SHA512
488f320330a47c7c0ee65ab3c53d8688d15491c8a4fec071e99933eb2dc008d9a4838721dc8f8f6aa2bf6129fcfeb39b8a4d3bec1d58ddb8ca11f83dd5288fd5
-
SSDEEP
6144:cDeK/Uz/a1leVfUV7UT3oAvLJ74Sgje6gNhAd+rICs8uWwB8yaQWeNeaL+GPThlC:AeLbaveVM9UTYUOSN6p9owB8yGeQWlSZ
Malware Config
Signatures
Files
-
fb623f4ae4dcaa007cac4365aa3ce13526ae32b94f2d9bfe5bf5b6f6a0e376b8.zip.zip
Password: infected
-
fb623f4ae4dcaa007cac4365aa3ce13526ae32b94f2d9bfe5bf5b6f6a0e376b8.exe.exe windows x86
Password: infected
b79b7ff25f59aa8cfc04296091d52f5c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
PeekNamedPipe
FindResourceExW
EndUpdateResourceW
InterlockedIncrement
VerSetConditionMask
ReadConsoleA
GetCurrentProcess
FlushConsoleInputBuffer
FreeEnvironmentStringsA
EnumCalendarInfoExW
GetWindowsDirectoryA
GetGeoInfoW
FindResourceExA
GlobalAlloc
LoadLibraryW
GetConsoleAliasW
HeapValidate
GetConsoleFontSize
GetDevicePowerState
IsBadStringPtrW
DeleteFiber
GetLastError
lstrcmpiA
GetProcAddress
VirtualAlloc
BuildCommDCBW
OpenWaitableTimerA
LoadLibraryA
DnsHostnameToComputerNameA
AddAtomW
CreateEventW
GetCommMask
SetCommMask
GetModuleHandleA
CreateWaitableTimerW
VirtualProtect
GetConsoleCursorInfo
LCMapStringA
SetPriorityClass
GetStringTypeW
GetStringTypeA
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapFree
HeapAlloc
TerminateProcess
IsDebuggerPresent
GetModuleHandleW
ExitProcess
GetStartupInfoW
RtlUnwind
RaiseException
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetCPInfo
WriteFile
GetStdHandle
GetModuleFileNameA
HeapCreate
VirtualFree
HeapReAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapSize
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoA
user32
GetCaretPos
GetDC
advapi32
BackupEventLogA
ole32
ReadClassStm
CoRegisterMallocSpy
winhttp
WinHttpSetDefaultProxyConfiguration
Sections
.text Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 244KB - Virtual size: 253KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 168KB - Virtual size: 167KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ