Static task
static1
Behavioral task
behavioral1
Sample
ca8e2744569cfd770bf26517e46dd082fece779e43752f58e30d8465a9c91f73.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ca8e2744569cfd770bf26517e46dd082fece779e43752f58e30d8465a9c91f73.exe
Resource
win10v2004-20230220-en
General
-
Target
b50ac4613ff111682cc4127b74ad054a.bin
-
Size
205KB
-
MD5
cc8a587297f98341b6669fd393be7c38
-
SHA1
0a1dc45ab7fedffcdcf92194593d85511de7c025
-
SHA256
effe5db2482f67db4f94f83a47c6d4ee68efb93ad5acefe0a0776a24e847cad1
-
SHA512
51b4ac48196e4293a98abb99c0c89e49c6e65557693fee8831efa865bf550d582b432077a443dd4ece2493cf6d735155eef8eb30ac14c522c1647dc3e72a8536
-
SSDEEP
6144:QfHtIdY5CNeuoBsxdJWyupcA/VonXqz9wAzjvvXB:1Y5huFJKv/Von6zeAHvvXB
Malware Config
Signatures
Files
-
b50ac4613ff111682cc4127b74ad054a.bin.zip
Password: infected
-
ca8e2744569cfd770bf26517e46dd082fece779e43752f58e30d8465a9c91f73.exe.exe windows x86
Password: infected
f066069725411bcfbfc1bc3fdf3c54c8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DebugActiveProcessStop
GetConsoleAliasExesLengthA
BuildCommDCBAndTimeoutsA
SetUnhandledExceptionFilter
EnumCalendarInfoW
InterlockedDecrement
GetNamedPipeHandleStateA
GetEnvironmentStringsW
SetComputerNameW
GetComputerNameW
FreeEnvironmentStringsA
GetModuleHandleW
GetTickCount
GetPrivateProfileStringW
GetDriveTypeA
LoadLibraryW
SetConsoleCP
GetFileAttributesA
SetConsoleMode
GetConsoleAliasW
GetFileAttributesW
GetModuleFileNameW
GetVolumePathNameA
FindNextVolumeMountPointW
GetStringTypeExA
EnumSystemLocalesA
CreateMutexW
InterlockedFlushSList
GetProcAddress
GetComputerNameExW
RemoveDirectoryA
PrepareTape
LoadLibraryA
LocalAlloc
SetCalendarInfoW
AddVectoredExceptionHandler
FindFirstVolumeMountPointW
BeginUpdateResourceA
PostQueuedCompletionStatus
EnumResourceTypesW
Process32NextW
FindNextFileA
FreeEnvironmentStringsW
RequestWakeupLatency
WaitForDebugEvent
GetVersionExA
FindAtomW
GetFileInformationByHandle
GetConsoleProcessList
DeleteFileA
CloseHandle
WriteConsoleW
OpenMutexW
DebugActiveProcess
InterlockedIncrement
EncodePointer
DecodePointer
Sleep
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
HeapFree
HeapReAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
HeapAlloc
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
IsProcessorFeaturePresent
HeapCreate
HeapDestroy
SetFilePointer
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
UnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
HeapSize
ExitProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetCurrentThread
WriteFile
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoW
FatalAppExitA
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
IsValidLocale
GetStringTypeW
SetConsoleCtrlHandler
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
FreeLibrary
CreateFileW
user32
GetMenu
advapi32
ReportEventW
Sections
.text Size: 166KB - Virtual size: 165KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 86KB - Virtual size: 3.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 99KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ