Static task
static1
Behavioral task
behavioral1
Sample
5c3e93d0d5cdec0c69be6c16345b484363b92204dbae3e9f2617ceb398a6b084.exe
Resource
win7-20230220-en
General
-
Target
4f66f66f965650e52fe23102942334ea.bin
-
Size
222KB
-
MD5
8576b2338d0673044dad8b7d54e872cf
-
SHA1
13e83e333406c304fedfaee2790ef1a2f9241840
-
SHA256
7d51f7f3dc28ade1a5f12ad1597391c330e257aef5b4392d0949ae00b593ded2
-
SHA512
a7e42157734d67ae582de730d9e4eb85d0c46a8c474d80dd6d9c0149383204a97757ebc4be0990921e444647391683c1a96b77a6f25d4080590de98aa822c5fd
-
SSDEEP
3072:hJpXUs3vbUmYF4LBw5WgJZwET6aqGHzTQqGDNnBk6oHy5r7K4SCneiq4tKMql7ma:LNUSfYF41wQgJpGr8nQqSnBsUheN8a
Malware Config
Signatures
Files
-
4f66f66f965650e52fe23102942334ea.bin.zip
Password: infected
-
5c3e93d0d5cdec0c69be6c16345b484363b92204dbae3e9f2617ceb398a6b084.exe.exe windows x86
Password: infected
be0f47579cb7b0a5ae2c8e4dc0e848d2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
UnlockFile
GetLogicalDrives
GetModuleHandleW
EnumCalendarInfoExW
VirtualFree
EnumTimeFormatsA
EnumTimeFormatsW
EnumResourceTypesA
GlobalAlloc
GetFileAttributesA
EnumSystemLocalesA
GetCPInfoExW
GetLastError
GetProcAddress
VirtualAlloc
RemoveDirectoryA
CreateMemoryResourceNotification
LoadLibraryA
WriteConsoleA
InterlockedExchangeAdd
CreateFileMappingA
OpenEventA
BeginUpdateResourceA
PostQueuedCompletionStatus
WriteProfileSectionW
FindFirstChangeNotificationA
VirtualProtect
OpenEventW
GetCPInfoExA
GetWindowsDirectoryW
AddConsoleAliasA
FindNextVolumeA
RaiseException
ScrollConsoleScreenBufferW
CopyFileExW
_hwrite
GetConsoleAliasesLengthW
MultiByteToWideChar
Sleep
ExitProcess
GetCommandLineA
GetStartupInfoA
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapFree
WriteFile
GetStdHandle
GetModuleFileNameA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapReAlloc
GetModuleHandleA
RtlUnwind
HeapSize
user32
CharLowerBuffW
RegisterClassA
gdi32
GetCharWidthI
GetCharWidthW
advapi32
LogonUserA
ole32
CoGetPSClsid
Sections
.text Size: 212KB - Virtual size: 212KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 39.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ