Static task
static1
Behavioral task
behavioral1
Sample
4b6a6957a37e14cc031fe81b7deaa6863a6921062b8f8cd71775eaaa24c977a5.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
4b6a6957a37e14cc031fe81b7deaa6863a6921062b8f8cd71775eaaa24c977a5.exe
Resource
win10-en-20211208
General
-
Target
4b6a6957a37e14cc031fe81b7deaa6863a6921062b8f8cd71775eaaa24c977a5.exe
-
Size
277KB
-
MD5
5b2aac5ebb5296244e5633f941a976b4
-
SHA1
fd58ed72f6cbb33c8c2c98fd068b799939cb8264
-
SHA256
4b6a6957a37e14cc031fe81b7deaa6863a6921062b8f8cd71775eaaa24c977a5
-
SHA512
4f034436f22994f89623c9ce1a1dbd0ce56f00b8fea5bb7ea696c5c84fe8a0af834d2c08bf5e5c969a6e5e15092150093a2f4b9ec6ec50bfff4ba18809e7891e
-
SSDEEP
6144:9zlY53VBZ3aOta40gze/3HELP7JvY/DbVEx14cEzMN00t9:pSvv3pBdzePHExvYbp2D
Malware Config
Signatures
Files
-
4b6a6957a37e14cc031fe81b7deaa6863a6921062b8f8cd71775eaaa24c977a5.exe.exe windows x86
5e7013cd1d50f8bab1fe0801fbd9846d
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapLock
GetExitCodeProcess
DeactivateActCtx
GetVersionExW
GetConsoleCP
GetConsoleAliasesLengthA
GetDefaultCommConfigA
FindFirstFileExA
GetDriveTypeA
FreeEnvironmentStringsW
SetProcessPriorityBoost
SetVolumeMountPointW
SetCurrentDirectoryW
GetLongPathNameW
CopyFileW
TlsGetValue
GetConsoleCursorInfo
SetComputerNameExW
SystemTimeToTzSpecificLocalTime
FindAtomA
ReleaseSemaphore
CallNamedPipeW
CreateMailslotW
BuildCommDCBAndTimeoutsA
VirtualProtect
LoadLibraryA
LocalAlloc
TryEnterCriticalSection
GetCommandLineW
InterlockedDecrement
GetCalendarInfoW
DeleteFileA
CreateActCtxW
OutputDebugStringA
SetSystemTimeAdjustment
SetPriorityClass
WritePrivateProfileStringW
GlobalUnWire
GetProcessHeap
GetStartupInfoW
GetDiskFreeSpaceExW
GetCPInfoExA
GetWindowsDirectoryA
GetSystemWow64DirectoryW
WriteProfileSectionA
GetProfileStringA
GetLastError
DeleteVolumeMountPointA
DebugBreak
GetPrivateProfileSectionW
lstrcmpA
ReadFileScatter
GetSystemWindowsDirectoryA
TerminateProcess
GlobalFindAtomW
FindCloseChangeNotification
GetTapeParameters
SetMailslotInfo
InterlockedExchange
DefineDosDeviceW
FindVolumeMountPointClose
EndUpdateResourceA
WriteConsoleA
GetSystemTimeAdjustment
GetPrivateProfileSectionA
WritePrivateProfileSectionA
GetPrivateProfileStructW
GetFileAttributesExW
MoveFileA
GetVolumePathNameA
HeapUnlock
lstrcmpW
SetDefaultCommConfigA
FindActCtxSectionGuid
ResetEvent
SetThreadContext
MoveFileExW
GlobalUnlock
UnregisterWaitEx
BuildCommDCBA
PeekConsoleInputW
GetBinaryTypeW
OpenEventW
TransmitCommChar
WaitNamedPipeA
GetPrivateProfileSectionNamesW
FindResourceExW
EnumTimeFormatsW
GetLocalTime
SetLocalTime
OpenSemaphoreA
GetProcAddress
SetFileShortNameA
lstrcpyW
VerLanguageNameW
SetThreadExecutionState
SetSystemTime
LockFile
VerSetConditionMask
SetConsoleCP
GetConsoleAliasW
FlushConsoleInputBuffer
AllocConsole
GetAtomNameW
WriteConsoleInputA
TransactNamedPipe
EnumDateFormatsW
GetCommState
_lopen
GetConsoleAliasExesLengthA
GetWriteWatch
SetConsoleMode
GetModuleHandleA
WriteConsoleOutputCharacterA
FileTimeToLocalFileTime
HeapReAlloc
GetCommMask
SetFilePointer
CancelWaitableTimer
GetProcessHandleCount
GetCurrentProcessId
SetNamedPipeHandleState
GetCompressedFileSizeA
FindNextVolumeMountPointW
GetFullPathNameA
WriteProfileStringA
DeleteAtom
GlobalAddAtomW
AssignProcessToJobObject
QueryDosDeviceW
InitializeCriticalSection
Process32FirstW
GetBinaryTypeA
CreateIoCompletionPort
RaiseException
GetCommandLineA
GetStartupInfoA
HeapValidate
IsBadReadPtr
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
Sleep
InterlockedIncrement
ExitProcess
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
SetHandleCount
GetStdHandle
GetFileType
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
HeapFree
VirtualFree
WriteFile
HeapAlloc
HeapSize
VirtualAlloc
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
RtlUnwind
InitializeCriticalSectionAndSpinCount
WriteConsoleW
OutputDebugStringW
LoadLibraryW
GetConsoleMode
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
FlushFileBuffers
SetStdHandle
GetConsoleOutputCP
CloseHandle
CreateFileA
user32
OemToCharW
Sections
.text Size: 154KB - Virtual size: 154KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 66KB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lato Size: 512B - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.woca Size: 512B - Virtual size: 34B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ