Static task
static1
Behavioral task
behavioral1
Sample
3b612ceb7d2bf66a141e439a181a3fdf1c0eb31a1006e4b1d127efe37f1d1115.exe
Resource
win10-en-20211208
General
-
Target
3b612ceb7d2bf66a141e439a181a3fdf1c0eb31a1006e4b1d127efe37f1d1115
-
Size
352KB
-
MD5
421c75538c12cfdf503bba86df4195ee
-
SHA1
f757d1413ae54ff901ada6a485310c0ae231dbd9
-
SHA256
3b612ceb7d2bf66a141e439a181a3fdf1c0eb31a1006e4b1d127efe37f1d1115
-
SHA512
d1c550c876741d1d9c64082ae590762f0759c69d0cb6750d0d80bf8d08077959a5d3d614db273ae4ad862f95e9cfa095af1c07eafb7d8573f0c9a05b7e708926
-
SSDEEP
6144:4b360DZU4vs8e6RcCAIbTAeNuGCx1PorgHPexO2XX1QW1ijFh:4uMg6nDNuGg1P+3U2XX64iT
Malware Config
Signatures
Files
-
3b612ceb7d2bf66a141e439a181a3fdf1c0eb31a1006e4b1d127efe37f1d1115.exe windows x86
1b6a0ed4ec9a2ac94164fc3cb0628915
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateNamedPipeA
TerminateProcess
DeactivateActCtx
GetConsoleAliasesLengthW
GetVersionExW
GetConsoleOutputCP
GetDefaultCommConfigW
FindFirstFileExA
GetDriveTypeA
FreeEnvironmentStringsW
SetProcessPriorityBoost
SetVolumeMountPointW
SetCurrentDirectoryA
GetLongPathNameA
TlsGetValue
SetComputerNameExW
FindAtomA
BuildCommDCBAndTimeoutsA
VirtualProtect
GetModuleHandleA
GlobalAlloc
InitializeCriticalSection
TlsSetValue
GetCommandLineW
InterlockedDecrement
GetCalendarInfoA
CopyFileW
ZombifyActCtx
OutputDebugStringW
SetSystemTimeAdjustment
GetPriorityClass
WritePrivateProfileStringW
GetProcessHeap
GlobalWire
HeapCompact
GetStartupInfoA
GetDiskFreeSpaceExA
GetCPInfoExW
GetWindowsDirectoryW
GetSystemWow64DirectoryW
SetLastError
GetProfileStringW
WriteProfileSectionW
GetProfileStringA
SetConsoleCursorPosition
GetLastError
DeleteVolumeMountPointA
ContinueDebugEvent
ReadFileScatter
GetNumberOfConsoleInputEvents
GetSystemWindowsDirectoryW
GlobalFindAtomA
FindNextChangeNotification
CreateActCtxA
GetMailslotInfo
GetPrivateProfileIntA
_lread
InterlockedExchange
DefineDosDeviceA
SetVolumeMountPointA
EndUpdateResourceA
WriteConsoleW
GetSystemTimeAdjustment
GetPrivateProfileSectionA
WritePrivateProfileSectionA
GetPrivateProfileStructA
TryEnterCriticalSection
GetPrivateProfileSectionNamesW
GetFileAttributesExW
LocalFileTimeToFileTime
MoveFileW
GetVolumePathNameW
HeapSetInformation
GetComputerNameA
FindActCtxSectionStringA
SetThreadContext
MoveFileExA
GlobalCompact
UnregisterWait
BuildCommDCBW
GlobalDeleteAtom
GetShortPathNameA
OpenEventA
SetCommTimeouts
WaitNamedPipeW
CreateIoCompletionPort
GetPrivateProfileSectionNamesA
FindResourceExW
GetSystemTimeAsFileTime
GetSystemInfo
GetLocalTime
OpenSemaphoreA
FreeEnvironmentStringsA
lstrcmpW
GetProcAddress
SetFileShortNameW
lstrcpyW
VerLanguageNameA
GetThreadSelectorEntry
GetSystemTime
UnlockFile
GetConsoleCP
GetConsoleAliasW
SetConsoleScreenBufferSize
GetAtomNameA
GetConsoleAliasExesLengthA
WriteConsoleInputW
CreateMailslotA
SetCommState
SetHandleCount
_lopen
GetConsoleAliasExesLengthW
ResetWriteWatch
ClearCommBreak
GetOverlappedResult
EnumDateFormatsA
GetModuleHandleW
WriteConsoleOutputCharacterW
HeapFree
OpenMutexW
GetStringTypeW
SetFilePointer
PostQueuedCompletionStatus
AreFileApisANSI
OpenWaitableTimerW
GetCurrentProcess
PeekNamedPipe
GetCompressedFileSizeW
FindNextVolumeMountPointA
GetFullPathNameA
WriteProfileStringW
InitAtomTable
GlobalAddAtomW
TerminateJobObject
SetFirmwareEnvironmentVariableA
GetBinaryTypeW
QueryDosDeviceA
LeaveCriticalSection
CreateFileA
InterlockedIncrement
Sleep
DeleteCriticalSection
EnterCriticalSection
RaiseException
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
MoveFileA
GetCommandLineA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetCPInfo
HeapValidate
IsBadReadPtr
TlsAlloc
GetCurrentThreadId
TlsFree
DebugBreak
GetStdHandle
WriteFile
OutputDebugStringA
GetFileType
ExitProcess
LoadLibraryW
CloseHandle
GetACP
GetOEMCP
IsValidCodePage
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetModuleFileNameA
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
GetLocaleInfoA
GetStringTypeA
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
FlushFileBuffers
GetConsoleMode
InitializeCriticalSectionAndSpinCount
LoadLibraryA
SetStdHandle
GetLocaleInfoW
WriteConsoleA
user32
OemToCharA
msimg32
AlphaBlend
Sections
.text Size: 228KB - Virtual size: 227KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 68KB - Virtual size: 221KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.yajic Size: 512B - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ