Static task
static1
Behavioral task
behavioral1
Sample
c863eaf5767320c5b325c47fed980a21a44fdb6ebc5e4ef56c3caa962aab3af0.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c863eaf5767320c5b325c47fed980a21a44fdb6ebc5e4ef56c3caa962aab3af0.exe
Resource
win10v2004-20230220-en
General
-
Target
9800515293.zip
-
Size
440KB
-
MD5
283d25156729382827d3e96882ceb833
-
SHA1
9b87e0b8d8b0fb41d48e328f5f2656a407e3607f
-
SHA256
4a887d368a1f06eec3625c188f51283a58b8a78c6659d750307f0eff187145fe
-
SHA512
6472b5fcac0c68bc456dfcd76f8eb6260ecdb93eca54b5cee7193626fba7af90617272a8d256e8e1720252316dfae27e173171ac5d98e630dae078debbc30ff3
-
SSDEEP
12288:F5J6vmfQaRTZk6JSm64OF4DUcjcvCtaFm3wjPbf4agAW:f2VCHdO6DUcjcvIYm3wjPbweW
Malware Config
Signatures
Files
-
9800515293.zip.zip
Password: infected
-
c863eaf5767320c5b325c47fed980a21a44fdb6ebc5e4ef56c3caa962aab3af0.exe windows x86
Password: infected
f186ba5cf1176ac98cd06e62338420a7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
GetConsoleMode
GetTempPathA
GetLastError
GetFileAttributesA
CreateFileA
DeleteFileA
CloseHandle
SetFileAttributesA
GetFileSize
ExitProcess
GetConsoleWindow
lstrcmpW
GetComputerNameA
ExitThread
SetEndOfFile
CreateFileW
ReleaseMutex
CreateMutexA
FindClose
ExpandEnvironmentStringsA
GetDriveTypeA
TerminateProcess
SetConsoleMode
WriteFile
GetCurrentProcess
FindNextFileW
GetFileSizeEx
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
GetTimeZoneInformation
ReadConsoleW
WriteConsoleW
FindFirstFileW
GetLogicalDrives
ReadFile
OutputDebugStringA
MoveFileExW
GetFileAttributesExW
CreateProcessA
GetExitCodeProcess
MultiByteToWideChar
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
DeleteCriticalSection
GetCurrentThreadId
DuplicateHandle
WaitForSingleObjectEx
GetCurrentThread
GetExitCodeThread
QueryPerformanceCounter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
GetModuleHandleW
GetProcAddress
EncodePointer
DecodePointer
GetStringTypeW
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
SetEvent
ResetEvent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
CreateTimerQueue
SignalObjectAndWait
SwitchToThread
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
OutputDebugStringW
GetThreadTimes
FreeLibrary
FreeLibraryAndExitThread
GetModuleFileNameW
GetModuleHandleA
LoadLibraryExW
GetVersionExW
VirtualAlloc
VirtualFree
VirtualProtect
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
LoadLibraryW
WaitForSingleObject
RtlUnwind
RaiseException
GetModuleHandleExW
HeapAlloc
HeapValidate
GetSystemInfo
GetModuleFileNameA
GetStdHandle
GetCommandLineA
GetCommandLineW
GetACP
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
FlushFileBuffers
GetConsoleCP
HeapFree
HeapReAlloc
HeapSize
HeapQueryInformation
GetProcessHeap
SetFilePointerEx
user32
ShowWindow
advapi32
CryptCreateHash
RegEnumKeyExA
RegOpenKeyExW
CryptDestroyKey
CryptAcquireContextW
CryptEncrypt
CryptReleaseContext
CryptDeriveKey
CryptHashData
CryptDestroyHash
wininet
HttpOpenRequestW
InternetOpenW
HttpSendRequestW
HttpAddRequestHeadersW
InternetConnectW
InternetCloseHandle
rstrtmgr
RmRestart
RmRegisterResources
RmGetList
RmStartSession
RmShutdown
RmEndSession
crypt32
CryptStringToBinaryA
CryptDecodeObjectEx
CryptImportPublicKeyInfo
ws2_32
gethostbyname
WSAStartup
inet_ntoa
gethostname
WSACleanup
Sections
.text Size: 798KB - Virtual size: 798KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 228KB - Virtual size: 227KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ