Static task
static1
Behavioral task
behavioral1
Sample
ac5499d4c6beceb67918a30a6b2a0d76a4c278c7ad0f2be0535bfb1eff517e60.exe
Resource
win10-20220414-en
General
-
Target
ac5499d4c6beceb67918a30a6b2a0d76a4c278c7ad0f2be0535bfb1eff517e60
-
Size
764KB
-
MD5
5aca807096dc022af563b0f12104fc89
-
SHA1
033fcf96b56e2ef0b8ecac446a7b3899db21c311
-
SHA256
ac5499d4c6beceb67918a30a6b2a0d76a4c278c7ad0f2be0535bfb1eff517e60
-
SHA512
b420f4ea7706b0b0d12cf525f5ba20d91824b661ae6d3906a0b33fa2935babaaaa972baba3fba1873a893806a32893231d8fe21843e2cd0799b55bd4237cd018
-
SSDEEP
12288:mU0z/+g+WkpM1pc68l0XPmuxU/X2eduT50HgJBvGZ5kZyInBnFfMpnsVlCD/vN55:F0z9KK3N8l0xU/XddaiAJBvGZ5kZyIB2
Malware Config
Signatures
Files
-
ac5499d4c6beceb67918a30a6b2a0d76a4c278c7ad0f2be0535bfb1eff517e60.exe windows x86
c4fe96246b42ed89eba209a1ad1599eb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenJobObjectA
GetCurrentProcess
SetDefaultCommConfigW
EnumCalendarInfoExW
GetConsoleAliasesLengthA
GetUserDefaultLangID
GetEnvironmentStrings
GlobalAlloc
LoadLibraryW
SetConsoleMode
GetGeoInfoA
GetSystemDirectoryA
GetBinaryTypeW
lstrcmpW
GetShortPathNameA
LCMapStringA
MoveFileExW
GetLastError
GetProcAddress
RemoveDirectoryA
GetDiskFreeSpaceW
GetAtomNameA
LoadLibraryA
LocalAlloc
CreateEventW
GetModuleFileNameA
GetCommTimeouts
FreeLibrary
InterlockedIncrement
FindResourceA
MultiByteToWideChar
EncodePointer
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetModuleHandleW
ExitProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCPInfo
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
Sleep
HeapSize
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
SetFilePointer
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringW
GetStringTypeW
HeapFree
RtlUnwind
HeapAlloc
HeapReAlloc
WriteConsoleW
SetStdHandle
FlushFileBuffers
RaiseException
CreateFileW
CloseHandle
gdi32
GetCharWidthFloatA
advapi32
ImpersonateAnonymousToken
Sections
.text Size: 654KB - Virtual size: 653KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 66KB - Virtual size: 39.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.puyori Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.yokasaw Size: 1024B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vexoxi Size: 512B - Virtual size: 23B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ