Static task
static1
Behavioral task
behavioral1
Sample
6e3f0d9720e660b39419767a2856ce765a5c18b5d4f37af1889132e3b33b3008.exe
Resource
win7-20230220-en
General
-
Target
61bb691f0c875d3d82521a6fa878e402.bin
-
Size
248KB
-
MD5
c15a7e1e6574330ac7c9aa8d61f8be52
-
SHA1
e4612aed7dfa4b433aa8f6c44a83e62447c50152
-
SHA256
60dd9d3c53fcc097795e75d3fc02e860eb04583009d0bee9753f0eb7edb8c72d
-
SHA512
86eabf267499dbfe3f0c12a5341318ec3c1dfab054c76ce3f9373ae6dbba3b4260e406cf5bcb1eadee968b29de2744e23da9014c589f840a5182dfe1b7d7bf59
-
SSDEEP
6144:1nLbd5I7L65SbEd5ef5ttcNTff/2qkpwKfem/w74qZUO:115I7L6k9PtATffKwKQ4lO
Malware Config
Signatures
Files
-
61bb691f0c875d3d82521a6fa878e402.bin.zip
Password: infected
-
6e3f0d9720e660b39419767a2856ce765a5c18b5d4f37af1889132e3b33b3008.exe.exe windows x64
Password: infected
e35abcab4ee51bc066ed7de67e6f54c1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
SetEndOfFile
Sleep
CloseHandle
TerminateProcess
WriteConsoleW
HeapSize
SetStdHandle
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
ReadConsoleW
ReadFile
HeapReAlloc
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetCurrentDirectoryW
CreateDirectoryW
CreateFileW
FindClose
FindFirstFileW
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
SetFileInformationByHandle
AreFileApisANSI
GetLastError
GetProcAddress
GetFileInformationByHandleEx
MultiByteToWideChar
WideCharToMultiByte
LocalFree
FormatMessageA
GetLocaleInfoEx
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
LCMapStringEx
GetStringTypeW
GetCPInfo
RtlUnwindEx
RtlPcToFileHeader
RaiseException
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
RtlUnwind
GetCurrentProcess
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
GetFileSizeEx
SetFilePointerEx
GetFileType
HeapAlloc
HeapFree
CompareStringW
advapi32
RegOpenKeyExW
ConvertSidToStringSidW
LookupAccountNameW
RegSetValueExW
shell32
SHGetFolderPathW
ole32
CoInitializeEx
CoCreateInstance
CoUninitialize
oleaut32
SysAllocString
VariantInit
VariantClear
SysFreeString
netapi32
NetUserEnum
ws2_32
socket
recv
WSACleanup
closesocket
gethostbyname
send
connect
WSAStartup
htons
Sections
.text Size: 308KB - Virtual size: 308KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 97KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 133KB - Virtual size: 139KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 248B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ