Static task
static1
Behavioral task
behavioral1
Sample
06a4a5e3c92425707c9e0720ae3c4e8fdb66100bc7ad801750870dfcc401c245.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
06a4a5e3c92425707c9e0720ae3c4e8fdb66100bc7ad801750870dfcc401c245.exe
Resource
win10v2004-20230221-en
General
-
Target
671a5553c82fb95a3c5711707d0b7d39.bin
-
Size
148KB
-
MD5
aae6386f7ea937de349113a4aeb29c13
-
SHA1
8e20ecaee7dfdb122e06d4ad1d921f7f306602ae
-
SHA256
1515cfe24d0cbc2159921eb6a91973ab11b4eb366028d16442a2d7cd7c9554bb
-
SHA512
5839086f429fff353930cc3cfb9d8ae9a7c456f43b5397762a529122652c38b46ab544405036e1e3e7ec107ac8075173102956343196e58f63770bbca658b847
-
SSDEEP
3072:OMVDHgYYlJbq9SS1pMzPS9YRkN56a2RohpJFAyerdhJ:VVHgZlJuAS1pMz8YRkNmodFYrh
Malware Config
Signatures
Files
-
671a5553c82fb95a3c5711707d0b7d39.bin.zip
Password: infected
-
06a4a5e3c92425707c9e0720ae3c4e8fdb66100bc7ad801750870dfcc401c245.exe.exe windows x86
Password: infected
3854ace520fdd4410d9fb24bd9855fc1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
QueryPerformanceCounter
UnlockFile
GetLogicalDrives
BackupSeek
GetModuleHandleW
VirtualFree
ConvertFiberToThread
ReadConsoleW
GetWindowsDirectoryA
EnumTimeFormatsA
EnumTimeFormatsW
EnumResourceTypesA
GetFirmwareEnvironmentVariableA
LoadLibraryW
GetFileAttributesA
GetShortPathNameA
EnumSystemLocalesA
SetThreadLocale
GetCPInfoExW
GetLastError
ScrollConsoleScreenBufferW
VirtualAlloc
HeapUnlock
LoadLibraryA
InterlockedExchangeAdd
LocalAlloc
OpenEventA
RemoveDirectoryW
BeginUpdateResourceA
PostQueuedCompletionStatus
WriteProfileSectionW
GetDefaultCommConfigA
VirtualProtect
ScrollConsoleScreenBufferA
AddConsoleAliasA
DebugBreak
EnumCalendarInfoExA
GetProcAddress
FindFirstChangeNotificationW
HeapSize
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
GetCommandLineA
GetStartupInfoA
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapFree
RaiseException
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
LeaveCriticalSection
EnterCriticalSection
GetLocaleInfoA
HeapReAlloc
GetModuleHandleA
RtlUnwind
user32
RegisterClassA
gdi32
GetCharWidthA
GetCharWidthI
ole32
CoGetPSClsid
winhttp
WinHttpOpen
Sections
.text Size: 141KB - Virtual size: 141KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 435KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ