Static task
static1
Behavioral task
behavioral1
Sample
1cf2f9ca3cc70c2919ba016a0166a95c81e1a09e95aaa5efb74c17e2a211c218.exe
Resource
win7-20230220-en
General
-
Target
8ede678cf734084b01751c5d54f7fba3.bin
-
Size
148KB
-
MD5
addea614d43201d3ca7f71d5d1b4f762
-
SHA1
6a67517a1c05e63407ad2e8593c1712fa8bce076
-
SHA256
71701f86d93f4ceee8e0bed7025bb3aede5fb789426b1e24b23360598ecee911
-
SHA512
ffc5c0bb5cc5a518c981a8ee06cf5d72c5854d4c807a7ad7b2135bb8b7f5cc0b207f7a190e91980d2a3b12298cbc9f312082671c24b72f84d01c24c4c3bece02
-
SSDEEP
3072:7Dz/y4IRGEb9K3TBXaWVO/qzu4Y7fXDp7o85D/FB:7ARxZK3TBvV3Y7fzpM81
Malware Config
Signatures
Files
-
8ede678cf734084b01751c5d54f7fba3.bin.zip
Password: infected
-
1cf2f9ca3cc70c2919ba016a0166a95c81e1a09e95aaa5efb74c17e2a211c218.exe.exe windows x86
Password: infected
b2c318b17515fb29914d21f372d37863
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ScrollConsoleScreenBufferW
QueryPerformanceCounter
GetLogicalDrives
LockFile
BackupSeek
GetModuleHandleW
VirtualFree
ConvertFiberToThread
ReadConsoleW
GetWindowsDirectoryA
EnumTimeFormatsA
EnumResourceTypesA
GetFirmwareEnvironmentVariableA
LoadLibraryW
GetFileAttributesA
GetShortPathNameA
EnumSystemLocalesA
SetThreadLocale
GetCPInfoExW
GetLastError
VirtualAlloc
WriteProfileSectionA
RemoveDirectoryA
LoadLibraryA
InterlockedExchangeAdd
LocalAlloc
OpenEventA
BeginUpdateResourceA
PostQueuedCompletionStatus
HeapWalk
VirtualProtect
ScrollConsoleScreenBufferA
AddConsoleAliasA
DebugBreak
EnumCalendarInfoExA
GetDefaultCommConfigW
GetProcAddress
FindFirstChangeNotificationW
HeapSize
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
GetCommandLineA
GetStartupInfoA
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapFree
RaiseException
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
LeaveCriticalSection
EnterCriticalSection
GetLocaleInfoA
HeapReAlloc
GetModuleHandleA
RtlUnwind
user32
RegisterClassA
gdi32
GetCharWidthA
GetCharWidthI
ole32
CoGetPSClsid
winhttp
WinHttpOpen
Sections
.text Size: 142KB - Virtual size: 141KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 435KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ