Static task
static1
Behavioral task
behavioral1
Sample
0dee4eb92fda7f8af1c00689eaac5393f5053043456065b84f2fb1e6b8b8c8ca.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0dee4eb92fda7f8af1c00689eaac5393f5053043456065b84f2fb1e6b8b8c8ca.exe
Resource
win10v2004-20230220-en
General
-
Target
9804568666.zip
-
Size
440KB
-
MD5
01381b09f42b937c26fecdc0f9ffbee1
-
SHA1
12c0cd515fb3db1d3fd3941098748697543570a2
-
SHA256
4df5ae08fb0c35f745856685c16108615a51efe0ec70c4aa76f665096d102cfb
-
SHA512
2e891784c338ed22220ad51bc07fba3ef1ae45bea9953f01ddf9a1f0f1dc794384fba596667767f77c7a678051dd12977e7ac1a1463930b7a8b610df0062bcd6
-
SSDEEP
12288:/5J6vmfQaRTZk6JSm64OF4DUcjcvCtaFm3wjPbf4an:h2VCHdO6DUcjcvIYm3wjPbwI
Malware Config
Signatures
Files
-
9804568666.zip.zip
Password: infected
-
0dee4eb92fda7f8af1c00689eaac5393f5053043456065b84f2fb1e6b8b8c8ca.exe windows x86
Password: infected
f186ba5cf1176ac98cd06e62338420a7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
GetConsoleMode
GetTempPathA
GetLastError
GetFileAttributesA
CreateFileA
DeleteFileA
CloseHandle
SetFileAttributesA
GetFileSize
ExitProcess
GetConsoleWindow
lstrcmpW
GetComputerNameA
ExitThread
SetEndOfFile
CreateFileW
ReleaseMutex
CreateMutexA
FindClose
ExpandEnvironmentStringsA
GetDriveTypeA
TerminateProcess
SetConsoleMode
WriteFile
GetCurrentProcess
FindNextFileW
GetFileSizeEx
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
GetTimeZoneInformation
ReadConsoleW
WriteConsoleW
FindFirstFileW
GetLogicalDrives
ReadFile
OutputDebugStringA
MoveFileExW
GetFileAttributesExW
CreateProcessA
GetExitCodeProcess
MultiByteToWideChar
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
DeleteCriticalSection
GetCurrentThreadId
DuplicateHandle
WaitForSingleObjectEx
GetCurrentThread
GetExitCodeThread
QueryPerformanceCounter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
GetModuleHandleW
GetProcAddress
EncodePointer
DecodePointer
GetStringTypeW
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
SetEvent
ResetEvent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
CreateTimerQueue
SignalObjectAndWait
SwitchToThread
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
OutputDebugStringW
GetThreadTimes
FreeLibrary
FreeLibraryAndExitThread
GetModuleFileNameW
GetModuleHandleA
LoadLibraryExW
GetVersionExW
VirtualAlloc
VirtualFree
VirtualProtect
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
LoadLibraryW
WaitForSingleObject
RtlUnwind
RaiseException
GetModuleHandleExW
HeapAlloc
HeapValidate
GetSystemInfo
GetModuleFileNameA
GetStdHandle
GetCommandLineA
GetCommandLineW
GetACP
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
FlushFileBuffers
GetConsoleCP
HeapFree
HeapReAlloc
HeapSize
HeapQueryInformation
GetProcessHeap
SetFilePointerEx
user32
ShowWindow
advapi32
CryptCreateHash
RegEnumKeyExA
RegOpenKeyExW
CryptDestroyKey
CryptAcquireContextW
CryptEncrypt
CryptReleaseContext
CryptDeriveKey
CryptHashData
CryptDestroyHash
wininet
HttpOpenRequestW
InternetOpenW
HttpSendRequestW
HttpAddRequestHeadersW
InternetConnectW
InternetCloseHandle
rstrtmgr
RmRestart
RmRegisterResources
RmGetList
RmStartSession
RmShutdown
RmEndSession
crypt32
CryptStringToBinaryA
CryptDecodeObjectEx
CryptImportPublicKeyInfo
ws2_32
gethostbyname
WSAStartup
inet_ntoa
gethostname
WSACleanup
Sections
.text Size: 798KB - Virtual size: 798KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 228KB - Virtual size: 227KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ