Static task
static1
Behavioral task
behavioral1
Sample
b3499b334d7a5e24a841a668073a72e4fb2ae095ee2e21d0988d66449d17aa37.exe
Resource
win10-20220414-en
General
-
Target
b3499b334d7a5e24a841a668073a72e4fb2ae095ee2e21d0988d66449d17aa37
-
Size
394KB
-
MD5
9aea8cf743b4a3510a92f4085fe23e95
-
SHA1
62889eec8c3bff812d3a94c30b5e43fd882c76fd
-
SHA256
b3499b334d7a5e24a841a668073a72e4fb2ae095ee2e21d0988d66449d17aa37
-
SHA512
757a40db709d0563fe7481bbd928f0ef56d5618e2fc9954c16de660532640ebf3eeb0968a075748ca1fc996b43ea41eb5a92e39f4f3b56ef7e2a7b53e2f64573
-
SSDEEP
12288:KDg4tZvbhexz41j4kmP9o31vHNYqs5hv/J:cg47bcV4MGjYHJ
Malware Config
Signatures
Files
-
b3499b334d7a5e24a841a668073a72e4fb2ae095ee2e21d0988d66449d17aa37.exe windows x86
108e59fc9121c3690210f4d6dc5641aa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFullPathNameW
FindResourceA
lstrcmpA
WriteConsoleInputW
TryEnterCriticalSection
WriteConsoleOutputCharacterW
WritePrivateProfileStructA
GetConsoleAliasesLengthW
SetComputerNameExA
MoveFileExA
lstrcpynA
GetConsoleAliasExesLengthA
BuildCommDCBAndTimeoutsA
LoadResource
UpdateResourceA
DeleteVolumeMountPointA
_lwrite
GetQueuedCompletionStatus
ReadConsoleA
InterlockedDecrement
ZombifyActCtx
WritePrivateProfileSectionA
SetDefaultCommConfigW
SetFirmwareEnvironmentVariableA
GetSystemWindowsDirectoryW
CreateJobObjectW
GetModuleHandleExW
GetProfileSectionA
InterlockedCompareExchange
WriteConsoleInputA
SetComputerNameW
GetComputerNameW
FlushConsoleInputBuffer
ConnectNamedPipe
CallNamedPipeW
GetProcessPriorityBoost
GetModuleHandleW
GetTickCount
GetConsoleAliasesA
GetConsoleAliasesLengthA
GetDllDirectoryW
GetConsoleTitleA
GetCompressedFileSizeW
GetCurrencyFormatA
GetConsoleAliasExesW
GetDateFormatA
GetUserDefaultLangID
GetCommandLineA
CreateActCtxW
EnumResourceTypesA
GetDriveTypeA
GetPriorityClass
GetVolumePathNameW
GlobalAlloc
GetSystemDirectoryW
SetFileShortNameW
LoadLibraryW
CopyFileW
AssignProcessToJobObject
GetCalendarInfoW
ReadProcessMemory
GetSystemWow64DirectoryW
ReadConsoleOutputW
FormatMessageW
GetVersionExW
GetFileAttributesA
SetConsoleMode
GetConsoleAliasW
GetWriteWatch
SetConsoleCursorPosition
VerifyVersionInfoA
WriteConsoleW
GetBinaryTypeA
TerminateProcess
GetMailslotInfo
GetTimeZoneInformation
CreateFileW
lstrcatA
GetBinaryTypeW
GetOverlappedResult
GetACP
lstrlenW
FindNextVolumeMountPointW
SetThreadPriority
RaiseException
GetStringTypeExA
DeactivateActCtx
GetNamedPipeHandleStateW
GetPrivateProfileIntW
SetCurrentDirectoryA
GetStartupInfoA
FillConsoleOutputCharacterW
FreeLibraryAndExitThread
GetHandleInformation
GetLastError
ChangeTimerQueueTimer
GetLongPathNameW
ReadConsoleOutputCharacterA
VerLanguageNameA
DefineDosDeviceW
EnumDateFormatsExA
CreateJobSet
LocalLock
WriteProfileSectionA
EnterCriticalSection
BuildCommDCBW
FindClose
GetPrivateProfileStringA
ResetEvent
_hwrite
GetLocalTime
GetAtomNameA
LoadLibraryA
InterlockedExchangeAdd
OpenWaitableTimerW
SetCalendarInfoW
GetFileType
WritePrivateProfileStringA
MoveFileA
SetConsoleOutputCP
GetExitCodeThread
AddAtomW
GetProfileStringA
VirtualLock
GlobalGetAtomNameW
GetCommMask
HeapWalk
GetTapeParameters
FoldStringW
SetSystemTime
GetModuleFileNameA
GetPrivateProfileSectionNamesA
FindNextFileA
WriteProfileStringA
EnumDateFormatsA
GlobalUnWire
FindFirstChangeNotificationA
QueueUserWorkItem
lstrcatW
FreeEnvironmentStringsW
EnumResourceNamesA
FindNextFileW
CreateMailslotA
GetStringTypeW
VirtualProtect
FatalAppExitA
OutputDebugStringA
GetCPInfoExA
SetThreadAffinityMask
OpenSemaphoreW
EndUpdateResourceA
GetVersionExA
GetDiskFreeSpaceExW
GetVersion
FindFirstVolumeW
GetCurrentProcessId
MoveFileWithProgressW
GetFileInformationByHandle
DebugBreak
FindActCtxSectionStringW
OpenFileMappingA
EnumSystemLocalesW
SuspendThread
CopyFileExA
DeleteFileA
lstrcpyA
InterlockedIncrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
MultiByteToWideChar
GetModuleFileNameW
GetStartupInfoW
HeapValidate
IsBadReadPtr
RtlUnwind
SetStdHandle
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
GetOEMCP
GetCPInfo
IsValidCodePage
GetStdHandle
OutputDebugStringW
ExitProcess
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
HeapDestroy
HeapCreate
HeapFree
VirtualFree
FlushFileBuffers
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
InitializeCriticalSectionAndSpinCount
WriteConsoleA
GetConsoleOutputCP
SetFilePointer
GetStringTypeA
GetLocaleInfoA
LCMapStringA
LCMapStringW
CreateFileA
CloseHandle
ReadFile
Sections
.text Size: 195KB - Virtual size: 194KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 179KB - Virtual size: 821KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bebuk Size: 512B - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vuh Size: 512B - Virtual size: 75B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.jeyuyip Size: 512B - Virtual size: 34B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ