Static task
static1
Behavioral task
behavioral1
Sample
f04a4dd4c448cc010e8dd8fa9a30ccca2b620f73cfae94639583cfd7baaeb1fc.exe
Resource
win10-20230220-en
General
-
Target
f04a4dd4c448cc010e8dd8fa9a30ccca2b620f73cfae94639583cfd7baaeb1fc.zip
-
Size
491KB
-
MD5
52023e6893d8d99bcd55c4ace9f094a2
-
SHA1
772dee2028144528b3e94c6d5b431d477c3fa926
-
SHA256
864911a5b3a78aff345ad3d40978f913d22362c0093013fe4e002cfaae38bb12
-
SHA512
968e55ba020ad1932789faaa38a5d8a6e1f60e69db64c530cffcfde0dc1499e7e5e29873fa0140c050c7ec0b8e4e584dc5b53e3f529e0bd576c675e7aa683a93
-
SSDEEP
12288:Ni+RbfOz44ODZm5JJqMR3shTE+1bYkW07d2ZX5v6S:NrRzO8HqPqMR3lAbY6e96S
Malware Config
Signatures
Files
-
f04a4dd4c448cc010e8dd8fa9a30ccca2b620f73cfae94639583cfd7baaeb1fc.zip.zip
Password: infected
-
f04a4dd4c448cc010e8dd8fa9a30ccca2b620f73cfae94639583cfd7baaeb1fc.exe.exe windows x86
Password: infected
faa9bc22484f2ee84085052705ae4f93
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
CreateProcessW
GetTickCount
LocalFree
FormatMessageA
FormatMessageW
CompareFileTime
GetCurrentDirectoryA
GetCurrentDirectoryW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
GetFileInformationByHandle
SetLastError
DeviceIoControl
VirtualAlloc
VirtualProtect
GetProcAddress
LoadLibraryA
SetCurrentDirectoryA
SetCurrentDirectoryW
CreateDirectoryA
CreateDirectoryW
DeleteFileA
DeleteFileW
RemoveDirectoryA
RemoveDirectoryW
SetFileAttributesA
SetFileAttributesW
SetFileTime
GetTempPathW
GetTempPathA
GetCurrentProcessId
GetCurrentThreadId
GetSystemDirectoryA
GetSystemDirectoryW
GetWindowsDirectoryA
GetWindowsDirectoryW
GetModuleHandleW
MoveFileA
MoveFileW
GetStdHandle
GetSystemInfo
GetModuleHandleA
HeapAlloc
HeapFree
GetProcessHeap
GetCurrentProcess
GlobalFree
lstrlenA
GlobalMemoryStatus
GetProcessAffinityMask
InitializeCriticalSection
SetEvent
GetVersionExA
ReleaseSemaphore
WaitForSingleObject
CreateEventA
ResumeThread
SetThreadAffinityMask
CreateSemaphoreA
GetModuleFileNameA
GetModuleFileNameW
LoadLibraryExA
LoadLibraryExW
LoadLibraryW
VirtualFree
GetDiskFreeSpaceA
GetDiskFreeSpaceW
GetDriveTypeA
GetDriveTypeW
GetVolumeInformationW
GetVolumeInformationA
GetDateFormatA
GetTimeFormatA
WaitForMultipleObjects
lstrcatW
lstrlenW
SetEndOfFile
FileTimeToLocalFileTime
GetSystemTimeAsFileTime
FileTimeToDosDateTime
DosDateTimeToFileTime
FindClose
FindCloseChangeNotification
FindFirstChangeNotificationA
FindFirstChangeNotificationW
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
GetFileAttributesA
GetFileAttributesW
GetLogicalDriveStringsW
GetLogicalDriveStringsA
FileTimeToSystemTime
WriteConsoleW
GlobalReAlloc
FreeLibrary
GlobalAlloc
HeapSize
ReadConsoleW
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
IsProcessorFeaturePresent
DeleteCriticalSection
GetLastError
CloseHandle
WriteFile
SetFilePointer
ReadFile
GetFileSize
CreateFileW
CreateFileA
LeaveCriticalSection
ResetEvent
EnterCriticalSection
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
SetFilePointerEx
GetFileSizeEx
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
HeapReAlloc
GetFileType
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
InitializeSListHead
RaiseException
RtlUnwind
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
ExitProcess
GetModuleHandleExW
CreateThread
ExitThread
FreeLibraryAndExitThread
DecodePointer
comdlg32
GetOpenFileNameA
GetOpenFileNameW
mpr
WNetGetResourceParentA
WNetCloseEnum
WNetEnumResourceW
WNetGetResourceInformationW
WNetGetResourceInformationA
WNetAddConnection2A
WNetAddConnection2W
WNetOpenEnumA
WNetOpenEnumW
WNetEnumResourceA
WNetGetResourceParentW
advapi32
RegSetValueExW
RegSetValueExA
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyExA
RegDeleteValueW
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
GetUserNameW
shell32
DragQueryFileW
DragFinish
SHGetMalloc
SHGetPathFromIDListA
SHBrowseForFolderA
DragQueryFileA
ole32
CoInitialize
CoUninitialize
oleaut32
VariantClear
SysAllocStringLen
VariantCopy
SysStringLen
SysAllocString
Sections
.text Size: 722KB - Virtual size: 721KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ