Static task
static1
Behavioral task
behavioral1
Sample
22adb7035a25bc288cb78f323f52c1c33a9e5113b387644da2947a3a1512e64f.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
22adb7035a25bc288cb78f323f52c1c33a9e5113b387644da2947a3a1512e64f.exe
Resource
win10v2004-en-20220113
General
-
Target
22adb7035a25bc288cb78f323f52c1c33a9e5113b387644da2947a3a1512e64f
-
Size
3.8MB
-
MD5
528b632a2846b97d1d6bc9756445a6d2
-
SHA1
a68b1b48327ea370288a3c8e70f720b227814d4b
-
SHA256
22adb7035a25bc288cb78f323f52c1c33a9e5113b387644da2947a3a1512e64f
-
SHA512
6da07734df2bb392a48bae53fbeec2519a1b62bf5e35ec49543fb7d8e9e3e26bbdf8169531dd9217a8c1958890aa3e865002fbca1f78b94e994ac3ca3a8bfb6f
-
SSDEEP
98304:Q6v26c3KFn+AJdB/tUx9YRMBjEJveqBuA7bpo2w/ZUAAXy:HK6nvJdB/tysMBEJvzuYzwhURC
Malware Config
Signatures
Files
-
22adb7035a25bc288cb78f323f52c1c33a9e5113b387644da2947a3a1512e64f.exe windows x86
6e7da54940d5b4c777c6d502c7acceec
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetVolumeLabelA
SetupComm
SetPriorityClass
IsBadStringPtrW
WriteConsoleOutputCharacterW
lstrlenA
GetNumaProcessorNode
GetDefaultCommConfigW
GetProcessIoCounters
SetConsoleScreenBufferSize
FlushViewOfFile
FindFirstFileExW
ConnectNamedPipe
GetTickCount
GetWindowsDirectoryA
WideCharToMultiByte
GetThreadSelectorEntry
_hread
SizeofResource
GetMailslotInfo
GetEnvironmentVariableA
CompareStringW
HeapReAlloc
GetProcAddress
GetLongPathNameA
EnumDateFormatsExA
EnumSystemCodePagesW
SetFileApisToOEM
GetAtomNameA
LoadLibraryA
GetProcessWorkingSetSize
FindFirstVolumeMountPointW
SetConsoleCtrlHandler
GetExitCodeThread
GetModuleFileNameA
CreateIoCompletionPort
_lread
VirtualProtect
SetCalendarInfoA
GetVolumeNameForVolumeMountPointW
GetCurrentProcessId
ResetWriteWatch
FindNextVolumeA
GetLastError
GetFullPathNameW
GetCommandLineA
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
HeapFree
SetFilePointer
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
RaiseException
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
MultiByteToWideChar
CloseHandle
CreateFileA
InitializeCriticalSectionAndSpinCount
HeapAlloc
VirtualAlloc
SetStdHandle
FlushFileBuffers
GetModuleHandleA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetEndOfFile
GetProcessHeap
ReadFile
HeapSize
user32
GetCaretPos
advapi32
RegisterEventSourceW
Sections
.text Size: 3.7MB - Virtual size: 3.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 6.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.toziy Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.nopiz Size: 1024B - Virtual size: 855B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kalako Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.nufoyu Size: 1KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ