Static task
static1
Behavioral task
behavioral1
Sample
1bdb359b72338b44cd435730edbdbddc5858ab15f1c95f52be3b0905b2daee83.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1bdb359b72338b44cd435730edbdbddc5858ab15f1c95f52be3b0905b2daee83.exe
Resource
win10v2004-20220414-en
General
-
Target
1bdb359b72338b44cd435730edbdbddc5858ab15f1c95f52be3b0905b2daee83
-
Size
160KB
-
MD5
3d16375a99ee04416d698710f27fe87b
-
SHA1
7e947072e4fcdc4acd87ee9649f619ff7f781aca
-
SHA256
1bdb359b72338b44cd435730edbdbddc5858ab15f1c95f52be3b0905b2daee83
-
SHA512
fef60849bc19d033297843bcc8c88da8d80d1955758e563243aa455a588591955e5b7e2c6acd6de941a61c96e0cefebefe418a80c126940dd679e03713da8572
-
SSDEEP
3072:p0LOBTbDgYwrQ/zpwMBAqg3QUOdNB1Vfc0OpDI/UTzVloXsRbs:2LSTbDg3m5Aqg+dxVfYtXzT8
Malware Config
Signatures
Files
-
1bdb359b72338b44cd435730edbdbddc5858ab15f1c95f52be3b0905b2daee83.exe windows x86
e96b3cabc45128b0636fff3b288889e3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
GetComputerNameA
CreateMutexW
SearchPathW
OpenFile
TlsGetValue
FindResourceExW
LocalCompact
LoadResource
ReadConsoleA
InterlockedDecrement
ScrollConsoleScreenBufferW
CompareFileTime
SetDefaultCommConfigW
GetProfileStringW
WaitForSingleObject
_lclose
GetProcessPriorityBoost
GetSystemTimeAsFileTime
LoadLibraryW
GetConsoleMode
GetPrivateProfileStructW
GetFileAttributesA
ReadFile
lstrcatA
CompareStringW
lstrlenW
DisconnectNamedPipe
DeactivateActCtx
GetPrivateProfileIntW
ReleaseActCtx
GetLastError
IsDBCSLeadByteEx
GetProcAddress
GetProcessHeaps
CreateNamedPipeA
IsValidCodePage
GetLocalTime
LocalAlloc
BuildCommDCBAndTimeoutsW
SetConsoleDisplayMode
BeginUpdateResourceA
VirtualLock
AddAtomA
GetTapeParameters
WaitCommEvent
ContinueDebugEvent
FreeEnvironmentStringsW
WriteProfileStringW
VirtualProtect
GetConsoleCursorInfo
OpenSemaphoreW
GetVersionExA
FindActCtxSectionStringW
SuspendThread
lstrcpyW
CopyFileExA
GetModuleHandleA
GetModuleHandleW
Sleep
GetStartupInfoW
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
WriteFile
GetStdHandle
GetModuleFileNameA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetCPInfo
GetACP
GetOEMCP
HeapSize
RtlUnwind
GetLocaleInfoA
WideCharToMultiByte
HeapAlloc
VirtualAlloc
HeapReAlloc
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
RaiseException
user32
GetCursorPos
Sections
.text Size: 123KB - Virtual size: 122KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 737KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ