Static task
static1
Behavioral task
behavioral1
Sample
a7d043cd2a0bc49cef0f04bfe8f01f8ac6d2419a3e6166b7d711bc08438e69c7.exe
Resource
win10-20220414-en
General
-
Target
a7d043cd2a0bc49cef0f04bfe8f01f8ac6d2419a3e6166b7d711bc08438e69c7
-
Size
850KB
-
MD5
e8d18b467864f0c7052ef14f3782f0a7
-
SHA1
9da3cca12e77f188d4859d4538ea03637b452ed8
-
SHA256
a7d043cd2a0bc49cef0f04bfe8f01f8ac6d2419a3e6166b7d711bc08438e69c7
-
SHA512
19ef88321aea64ba7b4b124d0ea34c92dc3c13fd29de6cc6f6c5a632ca7f08b409bb33f69dc8c4dcd8cc407df7556846876bc580edc87eefd8476324f080ef7f
-
SSDEEP
24576:11JC7ypHYtAxBDyZP0Z+l0L60KX29/5Bg:11JB1kNZPKLfB
Malware Config
Signatures
Files
-
a7d043cd2a0bc49cef0f04bfe8f01f8ac6d2419a3e6166b7d711bc08438e69c7.exe windows x86
0d686c4364bc2c7f3a384024716d37bf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MoveFileExW
OpenJobObjectA
InterlockedDecrement
GetCurrentProcess
GetEnvironmentStringsW
GetUserDefaultLCID
GetConsoleAliasesLengthA
GetUserDefaultLangID
GlobalAlloc
LoadLibraryW
CreateEventA
SetConsoleMode
GetBinaryTypeA
GetGeoInfoA
GetSystemDirectoryA
lstrcmpW
GetShortPathNameA
FreeLibrary
SetLastError
GetProcAddress
GetDiskFreeSpaceW
GetAtomNameA
LoadLibraryA
LocalAlloc
RemoveDirectoryW
GetModuleFileNameA
GetCommTimeouts
EnumCalendarInfoExA
CreateFileW
RaiseException
FindResourceA
GetConsoleAliasesLengthW
LCMapStringA
SetDefaultCommConfigA
FlushFileBuffers
SetStdHandle
MultiByteToWideChar
EncodePointer
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetModuleHandleW
ExitProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetLastError
IsProcessorFeaturePresent
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
Sleep
HeapSize
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
SetFilePointer
GetModuleFileNameW
FreeEnvironmentStringsW
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapFree
LCMapStringW
GetStringTypeW
RtlUnwind
HeapAlloc
HeapReAlloc
WriteConsoleW
CloseHandle
user32
ClientToScreen
gdi32
GetCharWidthFloatA
advapi32
CreateRestrictedToken
winhttp
WinHttpSetTimeouts
Sections
.text Size: 655KB - Virtual size: 655KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 66KB - Virtual size: 39.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gelukeb Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.veruc Size: 1024B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sepucas Size: 512B - Virtual size: 23B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.patarir Size: 1024B - Virtual size: 963B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ