Static task
static1
Behavioral task
behavioral1
Sample
2f6118f60c3a571980291b245001328f57b8fbc1496ee205a2357712523a7e4c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2f6118f60c3a571980291b245001328f57b8fbc1496ee205a2357712523a7e4c.exe
Resource
win10v2004-20230221-en
General
-
Target
d6264bc0f58cbd337e45f3ba46a64cb9.bin
-
Size
236KB
-
MD5
bc6cab2c9f6633bb62896fb9f998818d
-
SHA1
7a6d2c35267ddba8b1e375cf1b180b779d702d54
-
SHA256
c43758ae5e7f094a8781d27dd9eeeb4f8a1e5c9c00f82e868a2b1d6454c1c8b2
-
SHA512
451b85f99323b69f6d8bbc1ac28df064047003d53628ef638ff9a2e84d529419490c9d8c6784fc31f14e027ace170683c7afb4a3a1cd91c40d1a4a5f0db3d844
-
SSDEEP
6144:EG0Q5BLw99LnOZWfO/JJF3F1sAWuK+i7KdVnp:EG0qo9LnfOPF3bsARK+i7KdVp
Malware Config
Signatures
Files
-
d6264bc0f58cbd337e45f3ba46a64cb9.bin.zip
Password: infected
-
2f6118f60c3a571980291b245001328f57b8fbc1496ee205a2357712523a7e4c.exe.exe windows x64
Password: infected
6a98677d1be25d4274aaa7c9c37e832f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_FORCE_INTEGRITY
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mpr
WNetAddConnection2W
WNetCancelConnection2W
kernel32
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
RtlUnwindEx
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
FlsGetValue
FlsSetValue
FlsFree
GetCurrentThreadId
GetCurrentThread
FlsAlloc
HeapSetInformation
GetVersion
HeapCreate
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
MultiByteToWideChar
SetFilePointer
GetConsoleCP
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
LoadLibraryW
GetLocaleInfoW
LCMapStringW
GetStringTypeW
HeapReAlloc
ReadFile
SetStdHandle
WriteConsoleW
HeapSize
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
CreateFileW
FlushFileBuffers
GetModuleHandleA
FileTimeToLocalFileTime
GetTimeZoneInformation
SetConsoleMode
GetConsoleScreenBufferInfo
CreateEventA
SetEvent
GetProcAddress
GetCommandLineW
ResetEvent
TlsAlloc
TlsSetValue
TlsGetValue
RaiseException
WaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetThreadTimes
SetSystemTime
FileTimeToSystemTime
SystemTimeToFileTime
SetEndOfFile
CompareStringW
DeviceIoControl
GetFileSize
LockFileEx
UnlockFile
SetFileTime
DeleteFileW
GetFileAttributesW
GetFullPathNameW
GetEnvironmentVariableW
MoveFileExW
GetCurrentDirectoryW
SetCurrentDirectoryW
CreateDirectoryW
RemoveDirectoryW
WaitForMultipleObjectsEx
CreateFileA
CreateNamedPipeA
GetOverlappedResult
SetHandleInformation
DuplicateHandle
GetNamedPipeHandleStateA
GetNamedPipeInfo
CancelIo
PeekNamedPipe
WriteProcessMemory
ReadProcessMemory
GetExitCodeProcess
ResumeThread
CreateProcessW
GetHandleInformation
VirtualProtect
VirtualLock
CreateNamedPipeW
CreateEventW
DisconnectNamedPipe
ConnectNamedPipe
GetVersionExW
SetErrorMode
OutputDebugStringA
SetThreadPriority
LoadLibraryExW
GetSystemDirectoryW
CreateThread
ExitThread
DecodePointer
EncodePointer
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetCommandLineA
GetModuleFileNameA
LocalFree
GetWindowsDirectoryA
GetProcessHeap
HeapAlloc
HeapFree
GetVolumeInformationW
QueryDosDeviceW
GetCurrentProcessId
GetSystemDirectoryA
FreeLibrary
OpenProcess
LoadLibraryExA
VirtualQuery
ExpandEnvironmentStringsA
GetCurrentProcess
GetSystemInfo
Sleep
SetLastError
GetVersionExA
CreateMutexA
GetLastError
SetConsoleCtrlHandler
CloseHandle
SetEnvironmentVariableA
SetEnvironmentVariableW
WaitForSingleObjectEx
SetFileAttributesW
user32
OpenWindowStationA
GetProcessWindowStation
OpenDesktopA
SetProcessWindowStation
GetUserObjectSecurity
SetUserObjectSecurity
CloseDesktop
advapi32
LsaFreeMemory
GetUserNameW
InitializeSecurityDescriptor
InitializeAcl
SetSecurityDescriptorDacl
GetAce
AddAce
GetSecurityDescriptorDacl
GetAclInformation
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
DeleteService
RegOpenKeyExA
RegDeleteKeyA
RegCloseKey
OpenSCManagerA
CreateServiceA
OpenServiceA
ChangeServiceConfigA
CloseServiceHandle
SetServiceStatus
LookupAccountSidA
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
GetLengthSid
CopySid
IsValidSid
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
LsaOpenPolicy
LookupAccountNameW
RegOpenKeyExW
RegQueryValueExW
LsaClose
shell32
CommandLineToArgvW
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
ntdll
NtCreateFile
NtQueryInformationProcess
RtlFreeUnicodeString
NtQueryDirectoryFile
NtSetInformationFile
NtClose
NtQueryInformationFile
NtQueryDirectoryObject
NtQueryObject
NtOpenDirectoryObject
NtQueryVolumeInformationFile
Sections
.text Size: 1024KB - Virtual size: 1024KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 192KB - Virtual size: 192KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ