Static task
static1
Behavioral task
behavioral1
Sample
16d4fff452f729f520e89b329e281f6efb8ad29a70e33234c3a3ca22578d5e68.exe
Resource
win10-20220414-en
General
-
Target
16d4fff452f729f520e89b329e281f6efb8ad29a70e33234c3a3ca22578d5e68
-
Size
845KB
-
MD5
57b342946e01914ba5367e6e7effd79f
-
SHA1
0845feacf83c2aac0cde62595f7231521a8563cd
-
SHA256
16d4fff452f729f520e89b329e281f6efb8ad29a70e33234c3a3ca22578d5e68
-
SHA512
1f975283e99e6475d0cb9918cb235d60bc2d509e1a9350bb2e29520798fc5fe98667d153752d9ca8ad16f4126d45d18d5606548513e72f7524f13cd032ba2391
-
SSDEEP
12288:Kut+/WJSJZTEq3euc826b+IopryEwqEnZ3ELADbtJTirugoX1pAmJMjW0Wo:B+IqTVeuc8jbD43inVELUvvvEWo
Malware Config
Signatures
Files
-
16d4fff452f729f520e89b329e281f6efb8ad29a70e33234c3a3ca22578d5e68.exe windows x86
772437747c205badf1dd67f2dee75de8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MoveFileExW
InterlockedDecrement
GetCurrentProcess
GetUserDefaultLCID
EnumCalendarInfoExW
GetUserDefaultLangID
GetEnvironmentStrings
LoadLibraryW
SetConsoleMode
GetBinaryTypeA
GetGeoInfoA
GetSystemDirectoryA
lstrcmpW
GetLastError
SetLastError
FreeLibrary
RemoveDirectoryA
GetDiskFreeSpaceW
GetAtomNameA
LoadLibraryA
LocalAlloc
OpenEventA
OpenJobObjectW
GetCommTimeouts
GetShortPathNameW
GetCurrentProcessId
LCMapStringW
CreateFileW
RaiseException
FindResourceA
GetConsoleAliasesLengthW
GetProcAddress
SetDefaultCommConfigA
HeapSize
FlushFileBuffers
HeapAlloc
MultiByteToWideChar
HeapReAlloc
GetModuleHandleW
ExitProcess
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
IsProcessorFeaturePresent
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
SetFilePointer
HeapFree
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
Sleep
GetStringTypeW
RtlUnwind
WriteConsoleW
SetStdHandle
CloseHandle
user32
ClientToScreen
gdi32
GetCharWidthFloatA
advapi32
CreateRestrictedToken
winhttp
WinHttpSetTimeouts
Sections
.text Size: 649KB - Virtual size: 649KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 66KB - Virtual size: 39.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dosu Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.zawed Size: 1024B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.jife Size: 512B - Virtual size: 23B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dujuyup Size: 1024B - Virtual size: 963B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ