Static task
static1
Behavioral task
behavioral1
Sample
dde990b668b346c6aa6fc6775c1297f00acefe6118402.exe
Resource
win7-20220414-en
General
-
Target
dde990b668b346c6aa6fc6775c1297f00acefe6118402.exe
-
Size
346KB
-
MD5
450be6421a1e9953154800ff26d70602
-
SHA1
c19697c344e10a3dc788d51238303d564e30447a
-
SHA256
dde990b668b346c6aa6fc6775c1297f00acefe6118402726cc40be11600256f3
-
SHA512
d24e23135cfffd3f043a1edb544a38bab0e117f1961d2139ee7af1b4cdaf612eb3ba04d8e721134c6ef1d9b35468e70c9d817cac08504ee0c215c7b7a6cf6243
-
SSDEEP
6144:YrGfDTzXYA37pGDyiKcbpvuE0upoj2S/n2DxLoKr:oGfD/Xh3FGw+AEv2V8xLR
Malware Config
Signatures
Files
-
dde990b668b346c6aa6fc6775c1297f00acefe6118402.exe.exe windows x86
4556af061fe2abccc21c2f8048d4d531
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedIncrement
GetCurrentProcess
SetDefaultCommConfigW
GetSystemDefaultLCID
EnumCalendarInfoExW
GetConsoleAliasesLengthA
GetUserDefaultLangID
GetEnvironmentStrings
LoadLibraryW
SetConsoleMode
GetBinaryTypeA
GetGeoInfoA
GetSystemDirectoryA
lstrcmpW
GetShortPathNameA
FreeLibrary
SetLastError
GetProcAddress
RemoveDirectoryA
GetDiskFreeSpaceW
GetAtomNameA
LoadLibraryA
LocalAlloc
CreateEventW
OpenJobObjectW
GetModuleFileNameA
GetCommTimeouts
LCMapStringW
MoveFileExA
FindResourceW
GetLastError
GetConsoleAliasesLengthW
MultiByteToWideChar
EncodePointer
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
IsProcessorFeaturePresent
GetCPInfo
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
Sleep
HeapSize
ExitProcess
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
SetFilePointer
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapFree
GetStringTypeW
RtlUnwind
HeapAlloc
HeapReAlloc
WriteConsoleW
SetStdHandle
FlushFileBuffers
RaiseException
CreateFileW
CloseHandle
gdi32
GetCharWidthFloatA
advapi32
ImpersonateAnonymousToken
Sections
.text Size: 235KB - Virtual size: 235KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 66KB - Virtual size: 39.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fiju Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xubuka Size: 1024B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.cali Size: 512B - Virtual size: 23B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ