Static task
static1
Behavioral task
behavioral1
Sample
42a3a11367f39f4b5dda0d40b1183330072f8d85c3d2e79e42c46489e7dcce1d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
42a3a11367f39f4b5dda0d40b1183330072f8d85c3d2e79e42c46489e7dcce1d.exe
Resource
win10v2004-20230220-en
General
-
Target
42a3a11367f39f4b5dda0d40b1183330072f8d85c3d2e79e42c46489e7dcce1d.zip
-
Size
368KB
-
MD5
438d1f2966d97a61e2d6f0534f162b9f
-
SHA1
73b3522c83234ceb809fc9df18da0fe3f9409914
-
SHA256
37dfa936a8336dd36b8379f0ab078c79d062a531e62138efc6bd760d7f496532
-
SHA512
4ab1c19c83a2c86b9adab3bd0f17856d09cf46ca3f2a6608483154cf684574b9c87f2c47cf14ac0dccf890ed0cccb82de3c3a0dad6ce963b02e3dc1c2aa9e6cc
-
SSDEEP
6144:mpXBZGi4CsXhPoBI4oZ5VnQP8WQBdo3nvgrBQnMQVEjcujS3RYlEw:mZWC6hPo1oPLBdm2+Eje3OlEw
Malware Config
Signatures
Files
-
42a3a11367f39f4b5dda0d40b1183330072f8d85c3d2e79e42c46489e7dcce1d.zip.zip
Password: infected
-
42a3a11367f39f4b5dda0d40b1183330072f8d85c3d2e79e42c46489e7dcce1d.exe.exe windows x86
f59055ddf5d9b2bfdec5b43ba63509a2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VerSetConditionMask
GetCurrentProcess
FlushConsoleInputBuffer
GetModuleHandleW
ReadConsoleW
GetWindowsDirectoryA
GetGeoInfoW
GetConsoleAliasExesW
FindResourceExA
LoadLibraryW
GetNamedPipeInfo
GetConsoleAliasW
GetDevicePowerState
LCMapStringA
DeleteFiber
GetLastError
lstrcmpiA
InterlockedIncrement
VirtualAlloc
HeapSize
LoadLibraryA
OpenWaitableTimerW
LocalAlloc
DnsHostnameToComputerNameA
AddAtomW
CreateEventW
SetCommMask
FreeEnvironmentStringsW
BuildCommDCBA
VirtualProtect
GetConsoleCursorInfo
EndUpdateResourceA
CreateWaitableTimerA
EnumCalendarInfoExA
LCMapStringW
IsBadStringPtrW
lstrlenA
GetProcAddress
SetPriorityClass
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapFree
HeapAlloc
TerminateProcess
IsDebuggerPresent
ExitProcess
GetStartupInfoW
RtlUnwind
RaiseException
WideCharToMultiByte
MultiByteToWideChar
GetCPInfo
WriteFile
GetStdHandle
GetModuleFileNameA
HeapCreate
VirtualFree
HeapReAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
GetModuleHandleA
user32
WindowFromDC
GetCaretPos
gdi32
GetCharWidthA
advapi32
BackupEventLogW
Sections
.text Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 244KB - Virtual size: 253KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 165KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ