Static task
static1
Behavioral task
behavioral1
Sample
4cf571ee01adeb65e771faca68a4c06ecaaeeaa2951f3468a498895dc68138a0.exe
Resource
win10-en-20211208
General
-
Target
4cf571ee01adeb65e771faca68a4c06ecaaeeaa2951f3468a498895dc68138a0
-
Size
440KB
-
MD5
87f7ad34a17409d72ee7dd69f78de7ce
-
SHA1
322810254ead0bbfce5000ed9e99ddbe09a0f6a9
-
SHA256
4cf571ee01adeb65e771faca68a4c06ecaaeeaa2951f3468a498895dc68138a0
-
SHA512
6c02b3f77f91f859e1c8dbc990021c4a8aeb3a874b4dacfc7b922281f29e8742aa5620fb2c7997f1780140c47652894e05a979b25da6fe8b264ffa9cf5293ffe
-
SSDEEP
6144:0ReNICp6mlaJiofkiPZu0Kg9eHIbGolJ5wxuvNI4Z0ssubIXwVZd+8+e8jUuHrh:0INQeepMiPZP9eH0ZvNnIOIiE2uHEkZ
Malware Config
Signatures
Files
-
4cf571ee01adeb65e771faca68a4c06ecaaeeaa2951f3468a498895dc68138a0.exe windows x86
67b6bcc3e2c0beebb488c76e5b5389ff
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
WriteProfileSectionA
GetNumaProcessorNode
FindFirstVolumeA
SetConsoleCursorInfo
HeapLock
FindFirstChangeNotificationA
WaitForSingleObject
GetNamedPipeHandleStateW
DosDateTimeToFileTime
CallNamedPipeW
EnumResourceTypesW
EnumResourceNamesA
TerminateProcess
ZombifyActCtx
GetConsoleAliasesLengthW
GetVersionExW
GetConsoleOutputCP
GetDefaultCommConfigA
GetCommConfig
GetDriveTypeW
FreeEnvironmentStringsA
CreateTimerQueueTimer
FindNextVolumeW
LeaveCriticalSection
WriteConsoleInputW
TlsSetValue
SetComputerNameExW
FindAtomA
BuildCommDCBAndTimeoutsW
GlobalAlloc
EnterCriticalSection
TlsGetValue
GetCommandLineW
InterlockedExchange
CopyFileA
ReleaseActCtx
OutputDebugStringA
FormatMessageW
GetPriorityClass
WritePrivateProfileStringA
HeapSize
TerminateThread
GlobalUnfix
HeapCompact
GetStartupInfoA
CreatePipe
GetCPInfoExA
GetWindowsDirectoryA
GetSystemWow64DirectoryA
GetCalendarInfoW
DebugBreak
GetConsoleCursorInfo
SetLastError
DeleteVolumeMountPointW
DebugActiveProcessStop
lstrcmpA
GetPrivateProfileSectionNamesW
IsBadHugeWritePtr
GetProcAddress
GetSystemWindowsDirectoryA
FindCloseChangeNotification
CreateActCtxW
GetMailslotInfo
GetPrivateProfileIntW
_lread
InterlockedDecrement
DefineDosDeviceW
SetVolumeMountPointA
EndUpdateResourceW
WriteConsoleA
VirtualProtect
InterlockedPushEntrySList
DeleteCriticalSection
GetFileAttributesExA
FileTimeToSystemTime
GetVolumePathNameA
GetConsoleMode
HeapWalk
GetComputerNameA
FindActCtxSectionStringW
WriteProcessMemory
MoveFileExA
DisableThreadLibraryCalls
GetOverlappedResult
GlobalCompact
UnregisterWait
FatalExit
InterlockedCompareExchange
WaitNamedPipeW
SetLocalTime
EnumCalendarInfoExA
OpenSemaphoreA
FreeEnvironmentStringsW
GetPrivateProfileStructA
SetMailslotInfo
lstrcpyW
VerLanguageNameW
LockFile
GetFileType
SetConsoleCP
GetConsoleAliasA
GetLargestConsoleWindowSize
FindAtomW
CreateMailslotW
EnumDateFormatsW
GetCommState
GetFileInformationByHandle
_lopen
GetConsoleAliasExesLengthA
GetWriteWatch
GetPrivateProfileStringA
ClearCommError
ChangeTimerQueueTimer
SetSystemTime
CreateIoCompletionPort
WriteConsoleInputA
GetLastError
SetFirmwareEnvironmentVariableA
MoveFileW
GetConsoleDisplayMode
GetSystemDefaultLangID
SetFilePointer
GetQueuedCompletionStatus
AreFileApisANSI
OpenWaitableTimerA
GetProcessVersion
GetNamedPipeHandleStateA
FillConsoleOutputCharacterA
FindNextVolumeMountPointW
WriteProfileStringA
InitAtomTable
AddAtomA
WriteConsoleOutputCharacterW
QueryInformationJobObject
QueryDosDeviceW
GetBinaryTypeW
VirtualAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
DeleteFileA
RaiseException
GetCommandLineA
HeapValidate
IsBadReadPtr
GetModuleFileNameW
GetCurrentProcess
IsDebuggerPresent
GetModuleHandleW
Sleep
InterlockedIncrement
ExitProcess
GetModuleFileNameA
WriteFile
GetStdHandle
SetHandleCount
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStrings
WideCharToMultiByte
GetEnvironmentStringsW
TlsAlloc
TlsFree
HeapDestroy
HeapCreate
HeapFree
VirtualFree
HeapAlloc
HeapReAlloc
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
RtlUnwind
InitializeCriticalSectionAndSpinCount
WriteConsoleW
OutputDebugStringW
LoadLibraryW
GetConsoleCP
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
FlushFileBuffers
SetStdHandle
CloseHandle
CreateFileA
user32
OemToCharW
winhttp
WinHttpReadData
Sections
.text Size: 155KB - Virtual size: 155KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 176KB - Virtual size: 4.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ