Static task
static1
Behavioral task
behavioral1
Sample
d20add24db21888a00129eca3e0313d86faebfed31aab4f273e8e714ed1bfbbd.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
d20add24db21888a00129eca3e0313d86faebfed31aab4f273e8e714ed1bfbbd.exe
Resource
win10v2004-en-20220112
General
-
Target
d20add24db21888a00129eca3e0313d86faebfed31aab4f273e8e714ed1bfbbd
-
Size
994KB
-
MD5
1a01257e979825ddd98a39b8f2f9994a
-
SHA1
d77114c5e32c3cc5904eea994ad23976c01d4c5c
-
SHA256
d20add24db21888a00129eca3e0313d86faebfed31aab4f273e8e714ed1bfbbd
-
SHA512
7bd5e7f0d3e9dac8cab9374fc3c8afcce5e92dcfd4ae91db6d40bdfa8f12ad969e3b7b0d39e4e717c85d4c2ea6ca421e01a93055f77bcd84b94c6dfabaff43c2
-
SSDEEP
24576:AV8cfb0e1sXbNM6JMwgbXzGq3Cx3YJKPhv/wKvl:AVwPbO6qXGhpgKPh3wKv
Malware Config
Signatures
Files
-
d20add24db21888a00129eca3e0313d86faebfed31aab4f273e8e714ed1bfbbd.exe windows x86
1e0163f18068f24424ba312e38f61f2e
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateProcess
GetDriveTypeA
FindClose
OpenProcess
CreateToolhelp32Snapshot
Process32Next
CloseHandle
FreeConsole
lstrcmpW
GetLastError
SetLastError
QueryPerformanceCounter
QueryPerformanceFrequency
GetCurrentThread
GetThreadTimes
SetEndOfFile
WriteConsoleW
FindNextFileW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
HeapSize
HeapReAlloc
SetFilePointerEx
ReadConsoleW
ReadFile
SetStdHandle
CreateProcessA
GetExitCodeProcess
Process32First
FindFirstFileW
GetProcessHeap
GetLogicalDrives
MultiByteToWideChar
CreateDirectoryW
CreateFileW
DeleteFileW
FindFirstFileExW
GetDiskFreeSpaceExW
GetFileAttributesExW
GetFileInformationByHandle
AreFileApisANSI
GetModuleHandleW
GetProcAddress
MoveFileExW
WideCharToMultiByte
FormatMessageW
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
DeleteCriticalSection
GetCurrentThreadId
DuplicateHandle
WaitForSingleObjectEx
Sleep
GetCurrentProcess
SwitchToThread
GetExitCodeThread
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
EncodePointer
DecodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
SetEvent
ResetEvent
InitializeSListHead
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
CreateTimerQueue
SignalObjectAndWait
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
FreeLibrary
FreeLibraryAndExitThread
GetModuleFileNameW
GetModuleHandleA
LoadLibraryExW
GetVersionExW
VirtualAlloc
VirtualProtect
VirtualFree
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
LoadLibraryW
WaitForSingleObject
RtlUnwind
RaiseException
ExitProcess
GetModuleHandleExW
ExitThread
GetModuleFileNameA
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
GetACP
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
HeapAlloc
HeapFree
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ws2_32
select
recv
getpeername
WSAGetLastError
WSACleanup
WSAStartup
htons
ioctlsocket
send
freeaddrinfo
getaddrinfo
ntohl
inet_ntoa
inet_addr
htonl
connect
socket
setsockopt
closesocket
advapi32
CryptReleaseContext
CryptAcquireContextA
CryptGenRandom
Sections
.text Size: 730KB - Virtual size: 730KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 187KB - Virtual size: 186KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 27KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ