Static task
static1
Behavioral task
behavioral1
Sample
6c1ed5eb1267d95d8a0dc8e1975923ebefd809c2027427b4ead867fb72703f82.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
6c1ed5eb1267d95d8a0dc8e1975923ebefd809c2027427b4ead867fb72703f82.exe
Resource
win10v2004-20230220-en
General
-
Target
6c1ed5eb1267d95d8a0dc8e1975923ebefd809c2027427b4ead867fb72703f82.zip
-
Size
128KB
-
MD5
084b358278f51b1040d20508a323020c
-
SHA1
8766b2475467f8314fe3916b4df540705fbcc8d1
-
SHA256
7d1136ebeb182d6888ffa63373174d7a3c2624920ce7e6521ba3954449a9e647
-
SHA512
4423b9fa405f2958836128c63978d59b77d31c748da232650232a06eb0536233d2db6f0b49e7d1ea708300b1cabd6f1cc8f082fe381722564ecedf2618d357d3
-
SSDEEP
3072:dgk4ilyNNtq5bWqKlo5jNWxvrmvn3IGymZHHl:H50Ntq5CaNW1rmvIHe
Malware Config
Signatures
Files
-
6c1ed5eb1267d95d8a0dc8e1975923ebefd809c2027427b4ead867fb72703f82.zip.zip
Password: infected
-
6c1ed5eb1267d95d8a0dc8e1975923ebefd809c2027427b4ead867fb72703f82.exe.exe windows x86
Password: infected
d8ed4666ffd9b2589a77cd1e7eb2fcf6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetACP
GetStartupInfoW
GetLastError
GetProcAddress
VirtualAlloc
GetProcessShutdownParameters
GetThreadTimes
GetStringTypeW
TerminateProcess
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
IsValidCodePage
GetOEMCP
HeapSize
GetLocaleInfoW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetThreadSelectorEntry
LoadLibraryW
GetTickCount
WriteConsoleOutputCharacterW
GetModuleHandleW
IsValidLocale
FillConsoleOutputCharacterA
QueryPerformanceCounter
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameW
GetStdHandle
WriteFile
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapReAlloc
GetCommandLineW
HeapSetInformation
RaiseException
RtlUnwind
HeapAlloc
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapCreate
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
ExitProcess
user32
GetNextDlgTabItem
GetNextDlgGroupItem
DefDlgProcW
GetMenuDefaultItem
GetRegisteredRawInputDevices
CallMsgFilterW
PeekMessageA
GetMenuState
GetRawInputDeviceInfoA
OpenClipboard
GetDlgCtrlID
CloseClipboard
gdi32
StretchBlt
EndPath
FillPath
BitBlt
advapi32
AdjustTokenPrivileges
shell32
DragFinish
ExtractAssociatedIconW
ShellAboutA
ExtractIconA
FindExecutableA
DragQueryFileA
msimg32
TransparentBlt
Sections
.text Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ