Static task
static1
Behavioral task
behavioral1
Sample
8310ec88b6afefd4ed4d4d507cafc8d8ea9f70eca690f2ba8ac55d3d891934d8.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
8310ec88b6afefd4ed4d4d507cafc8d8ea9f70eca690f2ba8ac55d3d891934d8.exe
Resource
win10v2004-20230220-en
General
-
Target
9797099488.zip
-
Size
604KB
-
MD5
30605e7ea892c3ecf8e0333508b98034
-
SHA1
7fdc11b451d81d142418e935ceda62feb011de30
-
SHA256
7d42fab6c1e7b968278e86d8de034a6edb095e9b44ac1f59ca31bbcd04f86838
-
SHA512
de8c1690a408131dd403d992c1554fe6eff563bb57c7ecda43125c489da40a2a69f9d939986ff6d2919c9629244a3d247137ed83eb2f2ee20839453e0fde2a4f
-
SSDEEP
12288:lBPwitDNXWa9wyRy6g7NYcFU+6TZfSbzs2JBeftyiwyGoZPvJwv3Y+mFq73N1D:ouQAmNYv+QZ6ns2GlGMsL8sn
Malware Config
Signatures
Files
-
9797099488.zip.zip
Password: infected
-
8310ec88b6afefd4ed4d4d507cafc8d8ea9f70eca690f2ba8ac55d3d891934d8.exe windows x64
Password: infected
f602d8bfef6549a83e5cdb863ea92452
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
WriteFile
CreateFileW
LockResource
CloseHandle
LoadResource
FindResourceW
GetConsoleWindow
WinExec
GetCurrentProcess
SetLastError
QueryPerformanceCounter
QueryPerformanceFrequency
SetEndOfFile
WriteConsoleW
GetProcessHeap
SetPriorityClass
SizeofResource
GetLastError
CreateDirectoryW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
GetCurrentThreadId
WideCharToMultiByte
EncodePointer
DecodePointer
MultiByteToWideChar
LCMapStringEx
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
GetStringTypeW
GetCPInfo
InitializeSListHead
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetCurrentProcessId
IsDebuggerPresent
GetStartupInfoW
RtlUnwindEx
InterlockedPushEntrySList
RtlPcToFileHeader
RaiseException
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetStdHandle
GetModuleFileNameW
GetCommandLineA
GetCommandLineW
GetFileSizeEx
SetFilePointerEx
GetFileType
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
HeapFree
HeapAlloc
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
DeleteFileW
WaitForSingleObject
GetExitCodeProcess
CreateProcessW
GetFileAttributesExW
ReadFile
ReadConsoleW
HeapReAlloc
HeapSize
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
RtlUnwind
user32
ShowWindow
Sections
.text Size: 370KB - Virtual size: 369KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 130KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 343KB - Virtual size: 342KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ