Static task
static1
Behavioral task
behavioral1
Sample
15319e2289bb351467d4944bff9ae6c08a16d1e6f321b42311defe4b337fb6f0.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
15319e2289bb351467d4944bff9ae6c08a16d1e6f321b42311defe4b337fb6f0.exe
Resource
win10v2004-20220414-en
General
-
Target
15319e2289bb351467d4944bff9ae6c08a16d1e6f321b42311defe4b337fb6f0
-
Size
186KB
-
MD5
efe5547a2572257807e7ff798ddb8b13
-
SHA1
0e5b0e9299a9078a9c6cab5abaccc0aee328b6d4
-
SHA256
15319e2289bb351467d4944bff9ae6c08a16d1e6f321b42311defe4b337fb6f0
-
SHA512
397db5a334a35569296cc72962482aff2749644ca0a54e4f356ee2768eaf97f3fe516bb11905c82ee36d64ea22443588a8697d3543422f25194b0a267dfad13c
-
SSDEEP
3072:M3LC7AeFzLUgAJwfyQ2/592qGHmudIjq8FXjRly:qLDkLUgAJG4D2dpdJ4+
Malware Config
Signatures
Files
-
15319e2289bb351467d4944bff9ae6c08a16d1e6f321b42311defe4b337fb6f0.exe windows x86
234e35e93308aa0f3facb97ccf4ba405
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemDefaultLangID
LocalUnlock
GetPrivateProfileSectionNamesW
EnumResourceNamesW
SetDefaultCommConfigA
WritePrivateProfileStructA
CopyFileExW
TlsGetValue
SetLocalTime
GetNumberOfConsoleInputEvents
LoadResource
WriteTapemark
InterlockedIncrement
InterlockedDecrement
SetConsoleActiveScreenBuffer
GetProfileStringW
SleepEx
FreeEnvironmentStringsA
_lclose
GetModuleHandleW
VirtualFree
GetSystemTimeAsFileTime
ReadConsoleW
WriteFile
SetProcessPriorityBoost
ActivateActCtx
FindResourceExA
GlobalAlloc
GetPrivateProfileIntA
LoadLibraryW
SetSystemTimeAdjustment
GetFileAttributesA
WriteConsoleW
IsDBCSLeadByte
lstrcatA
GetACP
ExitThread
lstrlenW
DisconnectNamedPipe
GetLastError
GetProcAddress
CreateNamedPipeA
SetVolumeLabelW
MoveFileW
ReadFileEx
VirtualProtectEx
SearchPathA
SetConsoleDisplayMode
GetExitCodeThread
BeginUpdateResourceA
AddAtomA
GetTapeParameters
ContinueDebugEvent
CreateMutexA
PurgeComm
CompareStringA
GetConsoleCursorInfo
ScrollConsoleScreenBufferA
OpenSemaphoreW
GetVersionExA
DeleteFileW
DebugBreak
FindActCtxSectionStringW
GetSystemTime
SuspendThread
lstrcpyW
HeapAlloc
Sleep
ExitProcess
GetStartupInfoW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapFree
VirtualAlloc
HeapReAlloc
HeapCreate
GetStdHandle
GetModuleFileNameA
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
RaiseException
RtlUnwind
GetCPInfo
GetOEMCP
IsValidCodePage
HeapSize
GetLocaleInfoA
WideCharToMultiByte
GetModuleHandleA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
user32
GetCursorPos
Sections
.text Size: 144KB - Virtual size: 143KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 737KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ