Static task
static1
Behavioral task
behavioral1
Sample
7e6ba21c2fb7f3f4a422504154c7be3e72380d8770d69fb25eb3a547a6d2ac7e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
7e6ba21c2fb7f3f4a422504154c7be3e72380d8770d69fb25eb3a547a6d2ac7e.exe
Resource
win10v2004-20230220-en
General
-
Target
ee40e5a1a1eb7e93fdd3a953379304c0.bin
-
Size
174KB
-
MD5
693939950e6eb1a4dc6e4de9f011d8e3
-
SHA1
7378d3aadfa75f56d019843d6d757a6e9f93e1fc
-
SHA256
0d0f096bab0627ffc886f24531fc3a39940c4ee97bb0833b4afea7b13190941e
-
SHA512
a7a7f9d68f9fef3b991e2c5391b83d453ab5713865079b43ddfe8db7b34e6f979a16560881ade16a7edb6a3a35e3c1ddbd054b8617b107324d9b99ee0a5037dc
-
SSDEEP
3072:zyOlP7wf3y9bN6Ma8oLPiZSd2gA/rIdv2HwxARWWVGSYjQ404D/RHHIquNkt:u8P7hw11iSH7F2HSARWQG00HHInqt
Malware Config
Signatures
Files
-
ee40e5a1a1eb7e93fdd3a953379304c0.bin.zip
Password: infected
-
7e6ba21c2fb7f3f4a422504154c7be3e72380d8770d69fb25eb3a547a6d2ac7e.exe.exe windows x86
Password: infected
d233995a591f0c21b167474a8600ae08
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualQuery
FindResourceExW
GetCommState
GlobalSize
SetDefaultCommConfigW
GetProfileStringW
SetComputerNameW
AddConsoleAliasW
WaitForSingleObjectEx
FreeEnvironmentStringsA
GetCompressedFileSizeW
WaitNamedPipeW
CreateActCtxW
EnumResourceTypesA
SetHandleCount
TlsSetValue
FindResourceExA
VirtualFreeEx
LoadLibraryW
DeleteVolumeMountPointW
InterlockedPopEntrySList
SetConsoleMode
GetFileAttributesW
IsBadStringPtrA
WritePrivateProfileStringW
GetStringTypeExA
GetConsoleAliasesW
SetLastError
MoveFileExA
ReadConsoleOutputCharacterA
GetProcAddress
VirtualAlloc
BeginUpdateResourceW
EnumSystemCodePagesW
SetStdHandle
SearchPathA
SetThreadPriorityBoost
LoadLibraryA
LocalAlloc
CreateHardLinkW
AddAtomW
OpenEventA
WriteProfileSectionW
FoldStringA
GetModuleFileNameA
GetModuleHandleA
GetConsoleTitleW
WaitForDebugEvent
QueryPerformanceFrequency
SetCalendarInfoA
DeleteFileW
EnumCalendarInfoExA
FindNextVolumeA
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetLastError
HeapFree
MultiByteToWideChar
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
RaiseException
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetCPInfo
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
HeapAlloc
HeapCreate
VirtualFree
HeapReAlloc
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsFree
GetCurrentThreadId
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
InitializeCriticalSectionAndSpinCount
SetFilePointer
GetConsoleCP
GetConsoleMode
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
CreateFileA
CloseHandle
user32
GetCaretBlinkTime
gdi32
CreateDiscardableBitmap
SelectObject
Sections
.text Size: 194KB - Virtual size: 193KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 2.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ