Static task
static1
Behavioral task
behavioral1
Sample
c3fb821138d38ef9a2b0c77a4a3572ca38499b2dac3530c4a5faf2f789d57fc1.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c3fb821138d38ef9a2b0c77a4a3572ca38499b2dac3530c4a5faf2f789d57fc1.exe
Resource
win10v2004-20230220-en
General
-
Target
c3fb821138d38ef9a2b0c77a4a3572ca38499b2dac3530c4a5faf2f789d57fc1.zip
-
Size
246KB
-
MD5
5411b6db3178c3bd38648b4f0c5d356e
-
SHA1
9f9c83746c97725813d71591e37dc99488c6855b
-
SHA256
1f5f5988cfc776f3724171a65bf8bc51dc44884daae3bd90e94022cbb27875bf
-
SHA512
53b83b02a959a89c3a2b00a739fa990d3bef6ac99f83d708c1cf7bd630cee8fd29e74aae48a5bd78dc8b0fbde5e128ff24db08175e34871d0f401d96590231ae
-
SSDEEP
6144:bIPW7E5Il5D6ljDxiwzEpYwoZ+O9g+Z6eQerb:bIyilXxiARvZ+Mg+Z6HU
Malware Config
Signatures
Files
-
c3fb821138d38ef9a2b0c77a4a3572ca38499b2dac3530c4a5faf2f789d57fc1.zip.zip
Password: infected
-
c3fb821138d38ef9a2b0c77a4a3572ca38499b2dac3530c4a5faf2f789d57fc1.exe.exe windows x86
Password: infected
41e04b00ee73b43d4045563a97c09f68
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateMutexA
GetCurrentProcess
GetCurrentProcessId
ExitProcess
TerminateProcess
OpenProcess
GetModuleFileNameA
OpenMutexA
GetLastError
GetUserDefaultLangID
CreateToolhelp32Snapshot
Process32First
Process32Next
CreateThread
CreateFileW
GetConsoleCP
FlushFileBuffers
ReadConsoleW
GetLogicalDrives
GetDriveTypeA
Sleep
GetFullPathNameW
GetFileAttributesA
FindNextFileW
FindFirstFileExW
FindClose
MoveFileA
lstrcmpiA
CloseHandle
WriteFile
SetFilePointerEx
SetEndOfFile
ReadFile
GetFileSizeEx
CopyFileA
CreateFileA
GetConsoleMode
HeapQueryInformation
HeapReAlloc
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
RaiseException
MultiByteToWideChar
WideCharToMultiByte
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
HeapAlloc
HeapFree
GetProcessHeap
VirtualQuery
FreeLibrary
GetProcAddress
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
GetModuleFileNameW
LoadLibraryExW
EncodePointer
GetModuleHandleExW
GetStdHandle
HeapValidate
GetSystemInfo
GetCurrentThread
GetFileType
OutputDebugStringW
WriteConsoleW
SetConsoleCtrlHandler
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
GetStringTypeW
DecodePointer
user32
ExitWindowsEx
wsprintfA
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
CryptDecrypt
CryptEncrypt
CryptImportKey
CryptExportKey
CryptSetKeyParam
CryptDestroyKey
CryptGenKey
CryptAcquireContextA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
RegCreateKeyA
RegCloseKey
shell32
ShellExecuteA
shlwapi
PathFindFileNameA
Sections
.text Size: 716KB - Virtual size: 715KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 159KB - Virtual size: 158KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.00cfg Size: 512B - Virtual size: 260B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ