Static task
static1
Behavioral task
behavioral1
Sample
5e2189960616b6637d42386859075457ed8698075699085700501a30e856df0d.exe
Resource
win7-20220331-en
Behavioral task
behavioral2
Sample
5e2189960616b6637d42386859075457ed8698075699085700501a30e856df0d.exe
Resource
win10v2004-20220331-en
General
-
Target
5e2189960616b6637d42386859075457ed8698075699085700501a30e856df0d
-
Size
350KB
-
MD5
5ffd044223f9ee157d5b09e0430006b2
-
SHA1
44603ca848affe283f48122d8b1f876f67e751fe
-
SHA256
5e2189960616b6637d42386859075457ed8698075699085700501a30e856df0d
-
SHA512
cc6e6af0610944bdc15cce0023e5ec3a993fa3cd7a6b5761d9c146f0cc0e0efa7659dd9342d230c65ecb965fab80fa43abd81799568292da524b8b441dd160d5
Malware Config
Signatures
Files
-
5e2189960616b6637d42386859075457ed8698075699085700501a30e856df0d.exe windows x86
b07e20a0538650e5def588c168554340
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
CreateActCtxA
GetModuleHandleA
InterlockedExchangeAdd
ReadConsoleInputW
SetTapeParameters
GetTapeStatus
WaitNamedPipeA
GetTickCount
CreateFileA
GetPrivateProfileSectionW
PulseEvent
LocalLock
WriteProcessMemory
SetEvent
AllocConsole
SetConsoleTitleW
LoadLibraryA
VirtualAlloc
CommConfigDialogA
GetFileAttributesA
HeapLock
HeapReAlloc
GetUserDefaultLangID
lstrcatA
WriteConsoleOutputAttribute
GetVolumePathNamesForVolumeNameA
CreateMutexA
WaitForSingleObject
lstrlenA
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
RaiseException
GetLastError
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetCPInfo
HeapAlloc
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapCreate
VirtualFree
SetFilePointer
SetHandleCount
GetStdHandle
GetFileType
ExitProcess
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
HeapSize
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
SetStdHandle
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CloseHandle
user32
GetAltTabInfoW
Sections
.text Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 192KB - Virtual size: 66.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.punepa Size: 1024B - Virtual size: 626B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.horayu Size: 512B - Virtual size: 23B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.waf Size: 512B - Virtual size: 6B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ