Static task
static1
Behavioral task
behavioral1
Sample
66645fbcdf136f95a2cf8eef3dd37a5ed7c6df19281e297c4f9800ac3b324ffa.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
66645fbcdf136f95a2cf8eef3dd37a5ed7c6df19281e297c4f9800ac3b324ffa.exe
Resource
win10v2004-20220414-en
General
-
Target
66645fbcdf136f95a2cf8eef3dd37a5ed7c6df19281e297c4f9800ac3b324ffa
-
Size
400KB
-
MD5
6cfed836d46ca5f96be0076c403bb93b
-
SHA1
7eeb42c5c8d943b960cc913701babc5091cc9b22
-
SHA256
66645fbcdf136f95a2cf8eef3dd37a5ed7c6df19281e297c4f9800ac3b324ffa
-
SHA512
7fc584ea4ccf8615498a2e138d0641e1febaf4d2bc5967032ee396a52f3b2f1cebb1b754af7a414d10f904469903ba33b573dc3b20b2f14e22d8a4aa18ddacad
-
SSDEEP
6144:GLo8ZnlDPlEJbUXkGJ3hj/HbQvrfSlw+UUHdipNetOT0HikPfaRwq87SJ+N9G:G8oLeU7JR7HbBw+hdNOT0HikHaRwysN
Malware Config
Signatures
Files
-
66645fbcdf136f95a2cf8eef3dd37a5ed7c6df19281e297c4f9800ac3b324ffa.exe windows x86
21876c218bb24c74af39639e04f97713
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemDefaultLangID
SetDefaultCommConfigA
CopyFileExW
TlsGetValue
SetLocalTime
GetNumberOfConsoleInputEvents
LocalCompact
LoadResource
WriteTapemark
InterlockedIncrement
ReadConsoleA
InterlockedDecrement
SetConsoleActiveScreenBuffer
GetProfileStringW
WaitForSingleObject
ConnectNamedPipe
_lclose
SetTapeParameters
GetProcessHeap
GetSystemTimeAsFileTime
WriteFile
FindActCtxSectionStringA
SetProcessPriorityBoost
ActivateActCtx
FindResourceExA
GlobalAlloc
GetPrivateProfileIntA
LoadLibraryW
LocalShrink
SetSystemTimeAdjustment
GetFileAttributesW
IsDBCSLeadByte
lstrcatA
GetACP
lstrlenW
GetLastError
GetProcAddress
VirtualAlloc
BeginUpdateResourceW
CreateNamedPipeA
ReadFileEx
GetConsoleDisplayMode
VirtualProtectEx
SearchPathA
GetExitCodeThread
AddAtomA
GetTapeParameters
CreateMutexA
FreeEnvironmentStringsW
PurgeComm
CompareStringA
GetConsoleCursorInfo
ScrollConsoleScreenBufferA
OpenSemaphoreW
GetVersionExA
DebugBreak
GetSystemTime
SuspendThread
lstrcpyW
GetModuleHandleA
HeapAlloc
GetStartupInfoW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
HeapReAlloc
HeapCreate
GetModuleHandleW
Sleep
ExitProcess
GetStdHandle
GetModuleFileNameA
SetUnhandledExceptionFilter
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
InitializeCriticalSectionAndSpinCount
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
LoadLibraryA
GetCPInfo
GetOEMCP
IsValidCodePage
HeapSize
GetLocaleInfoA
WideCharToMultiByte
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
RaiseException
user32
GetCursorPos
Sections
.text Size: 368KB - Virtual size: 367KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 737KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ