Static task
static1
Behavioral task
behavioral1
Sample
afaba2400552c7032a5c4c6e6151df374d0e98dc67204066281e30e6699dbd18.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
afaba2400552c7032a5c4c6e6151df374d0e98dc67204066281e30e6699dbd18.exe
Resource
win10v2004-20230220-en
General
-
Target
afaba2400552c7032a5c4c6e6151df374d0e98dc67204066281e30e6699dbd18.zip
-
Size
177KB
-
MD5
763b5f9c6a21452c81fd1dcea9ca08b8
-
SHA1
fe47389caa04024719bb2cb7ba37ffe0a9d0417d
-
SHA256
83f66753f625b6a232600facbc457f2f9ef308fa03c75e669e9aa8bdd2ad47b2
-
SHA512
b5c02a754581efac1aad65a1c778920d3c86aa11b2f87d36efd86d888ac1d341f7f426a23f162910682da538aa978555fecab6c97d30eb7ab5925f1b17f39460
-
SSDEEP
3072:JvYucVm79GXm1E2YrhU769lOHkSDEyTSFXT0x3U3W+075EC55GEAkyN1F80LzJKB:yNmGWYtUqlaQyTSRTBW+A5Es4sQ1FHKB
Malware Config
Signatures
Files
-
afaba2400552c7032a5c4c6e6151df374d0e98dc67204066281e30e6699dbd18.zip.zip
Password: infected
-
afaba2400552c7032a5c4c6e6151df374d0e98dc67204066281e30e6699dbd18.exe.exe windows x86
Password: infected
99bff35f43bcff8998b2001d6df68577
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
gdi32
DeleteObject
GetStockObject
kernel32
CreateProcessW
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
FindResourceW
GetCommandLineA
GetLastError
GetModuleFileNameW
GetModuleHandleA
GetProcAddress
GetStartupInfoA
InitializeCriticalSection
InterlockedExchange
IsDBCSLeadByteEx
LeaveCriticalSection
LoadLibraryA
LoadResource
MultiByteToWideChar
SetUnhandledExceptionFilter
Sleep
TlsGetValue
VirtualProtect
VirtualQuery
WideCharToMultiByte
msvcrt
_strdup
_stricoll
__getmainargs
__mb_cur_max
__p__environ
__p__fmode
__set_app_type
_cexit
_errno
_fullpath
_iob
_onexit
_setmode
abort
atexit
atoi
calloc
exit
fputc
free
fwrite
getenv
isspace
localeconv
malloc
mbstowcs
memcpy
realloc
setlocale
signal
sprintf
strchr
strcoll
strlen
tolower
vfprintf
wcslen
wcstombs
ole32
CoInitializeEx
shell32
SHGetFolderPathA
user32
DispatchMessageA
GetMessageA
ShowWindow
TranslateMessage
UpdateWindow
Sections
.text Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
/4 Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 189KB - Virtual size: 189KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE