Static task
static1
Behavioral task
behavioral1
Sample
43b38b03a4d508d069883de17b26ec4d6c3100f2a283e7b54034dc92775797f7.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
43b38b03a4d508d069883de17b26ec4d6c3100f2a283e7b54034dc92775797f7.exe
Resource
win10v2004-20220310-en
General
-
Target
43b38b03a4d508d069883de17b26ec4d6c3100f2a283e7b54034dc92775797f7
-
Size
606KB
-
MD5
cade845aeef6b7efa5bedaec0cfbf3dd
-
SHA1
f82b1f1ab56e35f73e36978d762db8c55cc8acd5
-
SHA256
43b38b03a4d508d069883de17b26ec4d6c3100f2a283e7b54034dc92775797f7
-
SHA512
18ae7f55e723112996dd0dd47aa26a95cefc257b6c775c3404ca9656be7a01ac8453cbf04ce7143289ec97efae89837a795d9e0ef513bfa773263543cc75df0b
Malware Config
Signatures
Files
-
43b38b03a4d508d069883de17b26ec4d6c3100f2a283e7b54034dc92775797f7.exe windows x86
dcf092b576329b73157729f2065702c4
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleCP
FlushFileBuffers
LCMapStringEx
HeapSize
GetStringTypeW
HeapReAlloc
HeapAlloc
RtlUnwind
LoadLibraryW
OutputDebugStringW
GetConsoleMode
LoadLibraryExW
IsDebuggerPresent
GetCPInfo
SetStdHandle
SetFilePointerEx
WriteConsoleW
CloseHandle
GetOEMCP
GetACP
IsValidCodePage
Sleep
HeapFree
LeaveCriticalSection
EnterCriticalSection
GetModuleHandleW
TerminateProcess
GetCurrentProcess
FlsFree
FlsSetValue
FindResourceW
LoadResource
VirtualProtect
FlsGetValue
FlsAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount64
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetModuleFileNameA
GetStartupInfoW
InitOnceExecuteOnce
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetFileType
GetCommandLineA
IsProcessorFeaturePresent
GetLastError
SetLastError
InterlockedIncrement
InterlockedDecrement
GetCurrentThreadId
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
GetProcAddress
MultiByteToWideChar
GetStdHandle
WriteFile
GetModuleFileNameW
GetProcessHeap
CreateFileW
oleaut32
VarBstrFromCy
VarUI4FromCy
VarDecFromI1
VarUI1FromR8
shell32
SHGetPathFromIDListW
SHBrowseForFolder
winspool.drv
ord208
OpenPrinterW
WaitForPrinterChange
AddPrinterDriverExA
DeletePrinterDataW
mpr
WNetCloseEnum
WNetGetConnectionA
WNetGetNetworkInformationW
WNetDisconnectDialog1A
odbc32
ord30
ord241
ord106
ord75
ord140
ord206
ord221
OpenODBCPerfData
crypt32
CertSerializeCTLStoreElement
CryptExportPublicKeyInfoEx
CryptDecodeObject
CryptEncodeObject
wsnmp32
ord402
ord301
ord605
ord102
ord101
ord320
rtm
RtmDequeueRouteChangeMessage
RtmGetFirstRoute
MgmGetNextMfe
MgmInitialize
RtmDeregisterClient
gdi32
GetDeviceCaps
GetFontUnicodeRanges
GetEnhMetaFileDescriptionW
netapi32
NetAuditClear
NetErrorLogClear
NetAuditWrite
shlwapi
ord432
StrChrW
StrRChrIA
rpcrt4
RpcNsBindingInqEntryNameW
I_RpcMapWin32Status
usp10
ScriptIsComplex
winmm
waveOutSetVolume
mmioWrite
Sections
.text Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 537KB - Virtual size: 537KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ