Static task
static1
Behavioral task
behavioral1
Sample
a6afd676687acf2d56ec65844e8543dd528b310e2b977c394824a2ca96b23e3d.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
a6afd676687acf2d56ec65844e8543dd528b310e2b977c394824a2ca96b23e3d.exe
Resource
win10v2004-20220414-en
General
-
Target
a6afd676687acf2d56ec65844e8543dd528b310e2b977c394824a2ca96b23e3d
-
Size
5.5MB
-
MD5
59d3d2406da9ec9591a7f5064375603c
-
SHA1
a43f3d2ebfdf2700edec93c1aa3e8d7e529a0294
-
SHA256
a6afd676687acf2d56ec65844e8543dd528b310e2b977c394824a2ca96b23e3d
-
SHA512
233c715a750e159deb27c1e0d57856d47f8e7ab118933749bf8167abe3f3611fc094bf53584e708e5b34b224435f71ffcf3c85b85f7a00aeb917968b4e5dfad5
-
SSDEEP
98304:LUSk9JzbY4D/CPpoAXIHFqSuGMVeZlrWohOGR9oPiRvJeVPtr6BJWRk0IkE8eZ80:LUS0Jw4D6P7XIl4eZlidGXoUvJO6BJW
Malware Config
Signatures
Files
-
a6afd676687acf2d56ec65844e8543dd528b310e2b977c394824a2ca96b23e3d.exe windows x86
17ad1051188b70b0c515d0dd4d7ae68b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResumeThread
CreateProcessA
GetThreadContext
SetThreadContext
VirtualAlloc
VirtualFree
VirtualAllocEx
ReadProcessMemory
WriteProcessMemory
GetModuleFileNameA
TerminateProcess
GetProcAddress
LoadResource
LockResource
SizeofResource
FindResourceW
MultiByteToWideChar
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
Sleep
CloseHandle
GetModuleHandleA
CreateDirectoryW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
WideCharToMultiByte
GetStringTypeW
IsDebuggerPresent
IsProcessorFeaturePresent
GetModuleFileNameW
GetModuleHandleExW
HeapValidate
GetSystemInfo
RaiseException
GetLastError
LoadLibraryExW
RtlUnwind
GetCommandLineW
FatalAppExitA
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetTickCount
GetModuleHandleW
CreateSemaphoreW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStdHandle
WriteFile
ExitProcess
AreFileApisANSI
FlushFileBuffers
GetConsoleCP
GetConsoleMode
GetFileType
ReadFile
SetFilePointerEx
SetConsoleCtrlHandler
OutputDebugStringW
WaitForSingleObjectEx
CreateThread
OutputDebugStringA
WriteConsoleW
IsValidCodePage
GetACP
GetOEMCP
HeapFree
HeapReAlloc
HeapSize
HeapQueryInformation
GetCurrentThread
GetCurrentThreadId
HeapAlloc
GetProcessHeap
VirtualQuery
FreeLibrary
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetTimeZoneInformation
SetEnvironmentVariableA
SetStdHandle
ReadConsoleW
CreateFileW
SetEndOfFile
advapi32
RegCreateKeyExW
RegCloseKey
RegSetValueExW
Sections
.textbss Size: - Virtual size: 416KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 881KB - Virtual size: 881KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 150KB - Virtual size: 150KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4.5MB - Virtual size: 4.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ