_geek@8
Static task
static1
Behavioral task
behavioral1
Sample
4b6ee2fde3060c828d452cd2fc5f18979ed5dfc612c204867d35e8e613dedfda.exe
Resource
win7-20220414-en
General
-
Target
4b6ee2fde3060c828d452cd2fc5f18979ed5dfc612c204867d35e8e613dedfda
-
Size
210KB
-
MD5
4bfa9cefa15eac5ca5cded94aa2c5e1b
-
SHA1
1a853121291b92f5e9aeb223207a2fb7a50c4c9c
-
SHA256
4b6ee2fde3060c828d452cd2fc5f18979ed5dfc612c204867d35e8e613dedfda
-
SHA512
c3aeaec789c9eeb9f097316b3b1baa795ae62db81c43402c77617f344a855bdb09c8bc6726d7b0912da38147d67e2c39ad3dbbb8625660129daf708ac5f621f9
-
SSDEEP
3072:KdiXbELvWN5hGleEKWyXd7MUR72z4N2nPtsxz3OArv+0cpVUcWB5WXaHR6mQ:KCbELuvhGlyWCx3R7G42mV3OArvCs+v
Malware Config
Signatures
Files
-
4b6ee2fde3060c828d452cd2fc5f18979ed5dfc612c204867d35e8e613dedfda.exe windows x86
cf46dda78ef8caeb35fdd7108020274f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WritePrivateProfileStructA
TlsGetValue
SetLocalTime
MoveFileExA
_llseek
GetNumberOfConsoleInputEvents
CallNamedPipeA
LoadResource
LoadLibraryExW
WriteTapemark
ReadConsoleA
InterlockedDecrement
ScrollConsoleScreenBufferW
CompareFileTime
GetUserDefaultLCID
FlushConsoleInputBuffer
FreeEnvironmentStringsA
_lclose
SetTapeParameters
GetModuleHandleW
VirtualFree
GetSystemTimeAsFileTime
WriteFile
FindResourceExA
GlobalAlloc
Sleep
SizeofResource
DeleteVolumeMountPointW
LeaveCriticalSection
GetFileAttributesW
IsDBCSLeadByte
GetOverlappedResult
GetACP
lstrlenW
DeactivateActCtx
SetDefaultCommConfigA
GetProcAddress
GetTapeStatus
BeginUpdateResourceW
CreateNamedPipeA
LocalLock
WriteProfileSectionA
ReadFileEx
GetConsoleDisplayMode
SearchPathA
LoadLibraryA
WriteConsoleA
InterlockedExchangeAdd
LocalAlloc
SetCalendarInfoW
IsSystemResumeAutomatic
GetProfileStringA
SetNamedPipeHandleState
SetSystemTime
GetPrivateProfileSectionNamesA
GetThreadPriority
WaitCommEvent
ContinueDebugEvent
CreateMutexA
PurgeComm
EnumDateFormatsW
CompareStringA
GetConsoleCursorInfo
OpenSemaphoreW
GetVersionExA
DeleteFileW
DebugBreak
FindActCtxSectionStringW
lstrcpyW
CopyFileExA
AreFileApisANSI
SetVolumeLabelA
GetLastError
EnumResourceNamesW
InterlockedIncrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapFree
RtlUnwind
RaiseException
HeapAlloc
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
ExitProcess
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
HeapSize
VirtualAlloc
HeapReAlloc
GetCPInfo
GetOEMCP
IsValidCodePage
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
InitializeCriticalSectionAndSpinCount
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetModuleHandleA
gdi32
GetBoundsRect
GetBitmapDimensionEx
Exports
Exports
Sections
.text Size: 164KB - Virtual size: 164KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 4.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ