Static task
static1
Behavioral task
behavioral1
Sample
a2faed43fb596a2e59b9bedd0481bba0c289df4f8b1ee93b92dad3ca5dcee595.exe
Resource
win7-20220414-en
General
-
Target
a2faed43fb596a2e59b9bedd0481bba0c289df4f8b1ee93b92dad3ca5dcee595.exe
-
Size
241KB
-
MD5
e9b42d67c6b1d5f175f74e8cb2f6940e
-
SHA1
76af37cabcb66997463e158ca245461f98e3f9b7
-
SHA256
a2faed43fb596a2e59b9bedd0481bba0c289df4f8b1ee93b92dad3ca5dcee595
-
SHA512
a42109f183eed617132e6f7d05d526c9ba2ab183967fdf318e1215757c85b5ef9e42db4325c6c489db8db8d4c04b419d14f98646cba70c01a754251bafdb5821
-
SSDEEP
3072:wYvoKqtgvab/E+DSqZn4DkKAs0TrRLN//pGqMQ/Fe7U:DvrbSb/E+mqZn4DPt0nXiQ/YU
Malware Config
Signatures
Files
-
a2faed43fb596a2e59b9bedd0481bba0c289df4f8b1ee93b92dad3ca5dcee595.exe.exe windows x86
7571adbe544c88b5f4f231486e74f9e9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MoveFileExW
OpenJobObjectA
GetCurrentProcess
SetDefaultCommConfigW
GetSystemDefaultLCID
EnumCalendarInfoExW
GetConsoleAliasesLengthA
GetUserDefaultLangID
GetEnvironmentStrings
GlobalAlloc
LoadLibraryW
SetConsoleMode
GetGeoInfoA
GetSystemDirectoryA
GetBinaryTypeW
lstrcmpW
GetShortPathNameA
InterlockedIncrement
GetLastError
SetLastError
GetProcAddress
RemoveDirectoryA
GetDiskFreeSpaceW
GetAtomNameA
LoadLibraryA
LocalAlloc
CreateEventW
GetModuleFileNameA
GetCommTimeouts
FindResourceW
FreeLibrary
LCMapStringA
GetConsoleAliasesLengthW
MultiByteToWideChar
EncodePointer
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
IsProcessorFeaturePresent
GetCPInfo
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
Sleep
HeapSize
ExitProcess
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
SetFilePointer
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapFree
LCMapStringW
GetStringTypeW
RtlUnwind
HeapAlloc
HeapReAlloc
WriteConsoleW
SetStdHandle
FlushFileBuffers
RaiseException
CreateFileW
CloseHandle
gdi32
GetCharWidthFloatA
advapi32
ImpersonateAnonymousToken
Sections
.text Size: 130KB - Virtual size: 130KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 66KB - Virtual size: 39.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.wudu Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.yipiz Size: 1024B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rodeyo Size: 512B - Virtual size: 23B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ