Static task
static1
Behavioral task
behavioral1
Sample
ddf8718ab5e3bdff7c88239fc3a69bfc1db49867301de0dd8ea02714a97ca479.exe
Resource
win7-20220331-en
Behavioral task
behavioral2
Sample
ddf8718ab5e3bdff7c88239fc3a69bfc1db49867301de0dd8ea02714a97ca479.exe
Resource
win10v2004-20220310-en
General
-
Target
ddf8718ab5e3bdff7c88239fc3a69bfc1db49867301de0dd8ea02714a97ca479
-
Size
335KB
-
MD5
00a35c46fb497c63ddad0b39f1a1c809
-
SHA1
43b529ed3dbf4f63413a28b129946f69821ca3bd
-
SHA256
ddf8718ab5e3bdff7c88239fc3a69bfc1db49867301de0dd8ea02714a97ca479
-
SHA512
07481326adee08d4c237c9ba133a106a7422ce4d6ff044e710634ce2b227e387428b96d4d1c859aa354fa1664c951e9cae9361f5e032d6d2af3537cf65a66f6b
Malware Config
Signatures
Files
-
ddf8718ab5e3bdff7c88239fc3a69bfc1db49867301de0dd8ea02714a97ca479.exe windows x86
b07e20a0538650e5def588c168554340
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
CreateActCtxA
GetModuleHandleA
InterlockedExchangeAdd
ReadConsoleInputW
SetTapeParameters
GetTapeStatus
WaitNamedPipeA
GetTickCount
CreateFileA
GetPrivateProfileSectionW
PulseEvent
LocalLock
WriteProcessMemory
SetEvent
AllocConsole
SetConsoleTitleW
LoadLibraryA
VirtualAlloc
CommConfigDialogA
GetFileAttributesA
HeapLock
HeapReAlloc
GetUserDefaultLangID
lstrcatA
WriteConsoleOutputAttribute
GetVolumePathNamesForVolumeNameA
CreateMutexA
WaitForSingleObject
lstrlenA
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
RaiseException
GetLastError
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetCPInfo
HeapAlloc
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapCreate
VirtualFree
SetFilePointer
SetHandleCount
GetStdHandle
GetFileType
ExitProcess
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
HeapSize
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
SetStdHandle
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CloseHandle
user32
GetAltTabInfoW
Sections
.text Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 177KB - Virtual size: 66.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sowi Size: 1024B - Virtual size: 626B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.guvux Size: 512B - Virtual size: 23B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zax Size: 512B - Virtual size: 6B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ