Static task
static1
Behavioral task
behavioral1
Sample
b4434c51aef9b3c1f31f128e154baa65baf3c5f8e32b3d3160a12d5c7b7cc47c.exe
Resource
win7-20220310-en
General
-
Target
b4434c51aef9b3c1f31f128e154baa65baf3c5f8e32b3d3160a12d5c7b7cc47c
-
Size
757KB
-
MD5
901ed1bc5c04cbad84d80a490be1f067
-
SHA1
6204e1e6ee802bd92f2ba2d59a8c7f3b390ab8d0
-
SHA256
b4434c51aef9b3c1f31f128e154baa65baf3c5f8e32b3d3160a12d5c7b7cc47c
-
SHA512
e5ba8a74f9741d73b22e084c7801b2718a8b6ddb6f336ea65edb78eb39232e80ffd0399cf6c55f68220db7bbafc766390eb9c94d9a4d06db4e474c16b8fcc31c
Malware Config
Signatures
Files
-
b4434c51aef9b3c1f31f128e154baa65baf3c5f8e32b3d3160a12d5c7b7cc47c.exe windows x86
1e279c51d45defd271b8fb6e4c81815c
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStdHandle
ExpandEnvironmentStringsW
SetCurrentDirectoryW
CreateFileW
GetFileInformationByHandle
GetLogicalDriveStringsW
SetUnhandledExceptionFilter
ConnectNamedPipe
QueryPerformanceCounter
DeviceIoControl
LeaveCriticalSection
ReleaseMutex
OpenMutexW
GetSystemInfo
GetSystemDirectoryW
VirtualAllocEx
lstrlenA
FindResourceExW
GetModuleHandleA
GetModuleHandleW
LoadResource
LoadLibraryW
lstrlenW
ReadConsoleW
WriteConsoleW
SetConsoleCtrlHandler
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
DecodePointer
CloseHandle
ReadFile
SetFilePointerEx
GetFileSizeEx
GetConsoleMode
LoadLibraryA
CreateFileMappingW
GetCurrentDirectoryA
GetConsoleCP
FlushFileBuffers
HeapReAlloc
HeapSize
GetProcessHeap
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
GetStringTypeW
GetFileType
SetStdHandle
InitializeSListHead
RaiseException
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
GetLastError
SetLastError
EncodePointer
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
GetCurrentThread
OutputDebugStringW
HeapAlloc
HeapFree
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetCurrentThreadId
GetSystemTimeAsFileTime
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
GetStartupInfoW
GetCurrentProcessId
user32
GetWindowThreadProcessId
CharUpperW
GetSystemMetrics
FindWindowW
advapi32
RegCloseKey
RegNotifyChangeKeyValue
ole32
CoInitializeEx
ntdll
memset
memcpy
wcschr
strchr
memcmp
strrchr
memmove
Sections
.text Size: 622KB - Virtual size: 621KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 79KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ