Static task
static1
Behavioral task
behavioral1
Sample
342413f508cfe1eab5b82ce8e742e4e4280cc7e593dac7dcbdc7766826b60c84.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
342413f508cfe1eab5b82ce8e742e4e4280cc7e593dac7dcbdc7766826b60c84.exe
Resource
win10v2004-en-20220113
General
-
Target
342413f508cfe1eab5b82ce8e742e4e4280cc7e593dac7dcbdc7766826b60c84
-
Size
386KB
-
MD5
947d681eadad9abc4b041921d836555f
-
SHA1
28aff89ed074abdd910891079e80b8046e937d80
-
SHA256
342413f508cfe1eab5b82ce8e742e4e4280cc7e593dac7dcbdc7766826b60c84
-
SHA512
aff2b88b5cc1f1629c77073d4731fa0abd455b091a01bd55cb10e82bae5e8c7cb4de7a5d58d0b74140b08cf7e4e07a37a462d1a91148fe7b2200b34431146706
Malware Config
Signatures
Files
-
342413f508cfe1eab5b82ce8e742e4e4280cc7e593dac7dcbdc7766826b60c84.exe windows x86
46177d6fb97ec2e405da5559d03aafcb
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
GetLocalTime
K32EnumProcesses
SetFilePointerEx
VirtualAllocEx
GetCurrentProcessId
K32EnumProcessModules
GetSystemTime
CreateEventA
GetTickCount
GetDriveTypeW
ReadConsoleW
ReadFile
K32GetModuleFileNameExA
HeapReAlloc
HeapSize
CreateFileW
WriteConsoleW
FlushFileBuffers
GetProcessHeap
GetStringTypeW
GetFileType
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTimeZoneInformation
GetVolumeNameForVolumeMountPointW
OpenProcess
GetSystemDefaultLangID
GetDateFormatEx
WaitForSingleObject
WaitForMultipleObjects
GetStdHandle
GetCurrentProcess
GetFileSizeEx
SetEndOfFile
GetLogicalDrives
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
TerminateProcess
EncodePointer
RaiseException
GetLastError
SetLastError
RtlUnwind
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
ExitProcess
GetModuleHandleExW
WriteFile
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
GetACP
HeapFree
HeapAlloc
LCMapStringW
GetConsoleCP
GetConsoleMode
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
DecodePointer
user32
EnumWindowStationsA
GetDC
GetSystemMetrics
GetShellWindow
GetWindowTextA
GetForegroundWindow
SetWindowContextHelpId
SendMessageA
GetWindowDC
GetMenuItemRect
GetCaretBlinkTime
GetMenuItemInfoA
GetClipboardFormatNameA
PtInRect
UpdateWindow
GetCursorPos
advapi32
GetSidSubAuthorityCount
GetSidLengthRequired
GetNamedSecurityInfoA
ImpersonateAnonymousToken
ImpersonateLoggedOnUser
DuplicateToken
ConvertStringSidToSidA
GetLengthSid
GetSidIdentifierAuthority
GetTokenInformation
GetAclInformation
Sections
.text Size: 174KB - Virtual size: 173KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 268B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 182KB - Virtual size: 182KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ