Static task
static1
Behavioral task
behavioral1
Sample
b34526aa6b117d193c47b0e3a23d4145ab32bca9da64e5c1cf7ad74e1d37eae6.exe
Resource
win10-20220414-en
General
-
Target
b34526aa6b117d193c47b0e3a23d4145ab32bca9da64e5c1cf7ad74e1d37eae6
-
Size
310KB
-
MD5
0dafafddb4d1e562de61a3da899229a0
-
SHA1
eec5a759b066b0692a60e3cab4a66a2efd0a6f04
-
SHA256
b34526aa6b117d193c47b0e3a23d4145ab32bca9da64e5c1cf7ad74e1d37eae6
-
SHA512
db7e18317fe1f90c237cea9396d68224c9fa26e4303f5249fd58337abd71c0f7775afafff8f97d47c72e442660ba7ca88e94991ed29fd98d7748925314fc4775
-
SSDEEP
6144:c0BLeOQ5C++Au0ZlMooqXzbAjnE/aUA4Plm9Yeo:c0BvQ8730ZlMooqXzbAfp4dmu
Malware Config
Signatures
Files
-
b34526aa6b117d193c47b0e3a23d4145ab32bca9da64e5c1cf7ad74e1d37eae6.exe windows x86
3bfd7473e430500ed1d2bf7635bb6b63
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcatA
FindFirstChangeNotificationA
GetNamedPipeHandleStateW
GetOverlappedResult
FillConsoleOutputCharacterW
GetQueuedCompletionStatus
TerminateProcess
GetCurrentProcessId
FindNextFileA
CopyFileExA
BuildCommDCBAndTimeoutsA
EnumDateFormatsA
GetVersionExW
VirtualLock
WriteProfileStringW
VerifyVersionInfoA
GetProcessPriorityBoost
GetPriorityClass
GetCompressedFileSizeW
FindNextVolumeMountPointW
OutputDebugStringW
GetWriteWatch
WriteConsoleInputA
GetConsoleTitleA
SetComputerNameExW
GetTimeZoneInformation
LoadLibraryW
GetSystemDirectoryW
GetDriveTypeA
GetModuleHandleA
GlobalAlloc
GetShortPathNameA
ZombifyActCtx
GetProfileSectionA
DeleteFileW
GetCommandLineW
ReadConsoleOutputCharacterA
GetCalendarInfoW
ReleaseActCtx
FindResourceA
FormatMessageW
GetModuleFileNameA
CreateJobObjectW
EnterCriticalSection
SetFirmwareEnvironmentVariableA
GetDllDirectoryW
GetExitCodeThread
LoadLibraryA
WritePrivateProfileStringA
GetConsoleAliasesLengthW
WriteProfileSectionA
InterlockedDecrement
AddAtomW
UpdateResourceA
GetVersionExA
InterlockedExchangeAdd
GetStartupInfoW
ConnectNamedPipe
GetConsoleAliasExesW
DebugBreak
EndUpdateResourceA
GetLastError
GetSystemWindowsDirectoryW
GetSystemWow64DirectoryW
GetCPInfoExA
GetStringTypeExW
DeleteVolumeMountPointA
FatalAppExitA
SetSystemTime
OpenFileMappingW
lstrcmpA
SetConsoleCursorPosition
SetDefaultCommConfigW
GetACP
GetCurrencyFormatA
CreateActCtxW
GetTapeParameters
GetMailslotInfo
GetConsoleAliasW
_lwrite
GetDiskFreeSpaceExA
DefineDosDeviceW
GetAtomNameA
FlushConsoleInputBuffer
EnumResourceTypesA
lstrlenW
GetLongPathNameW
CreateJobSet
WriteConsoleW
VirtualProtect
ReadConsoleOutputW
SuspendThread
BuildCommDCBW
GetStringTypeW
GetHandleInformation
GetComputerNameW
WritePrivateProfileSectionA
WritePrivateProfileStructA
TryEnterCriticalSection
GetPrivateProfileSectionNamesA
CopyFileW
MoveFileA
GetVolumePathNameA
SetConsoleMode
HeapWalk
FindNextFileW
ResetEvent
ReadProcessMemory
MoveFileExA
GetVersion
ChangeTimerQueueTimer
WriteConsoleInputW
InterlockedCompareExchange
GetCommMask
SetFileShortNameA
lstrcpyW
VerLanguageNameA
FreeEnvironmentStringsA
EnumDateFormatsExW
GetProfileStringA
GlobalGetAtomNameW
GetConsoleAliasesA
CreateMailslotW
SetConsoleOutputCP
MoveFileWithProgressW
GetFileInformationByHandle
GetLocalTime
FoldStringW
EnumSystemLocalesW
CallNamedPipeW
GetConsoleAliasExesLengthA
OpenSemaphoreW
GetPrivateProfileIntA
GetModuleHandleExW
WriteConsoleOutputCharacterW
SetComputerNameW
FindActCtxSectionStringW
GetTickCount
FreeLibraryAndExitThread
_hwrite
GetUserDefaultLangID
LocalLock
FindFirstVolumeW
FindClose
OpenWaitableTimerW
EnumResourceNamesA
OpenFileMappingA
GetFileType
QueueUserWorkItem
RaiseException
lstrcpynA
GetFullPathNameA
SetThreadPriority
ReadConsoleA
AssignProcessToJobObject
CreateFileW
GetDateFormatA
DeactivateActCtx
SetCurrentDirectoryW
GetFileAttributesA
GetBinaryTypeW
SetCalendarInfoW
InterlockedIncrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
RtlUnwind
HeapValidate
IsBadReadPtr
GetProcAddress
TlsGetValue
GetModuleHandleW
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
GetStdHandle
WriteFile
OutputDebugStringA
ExitProcess
QueryPerformanceCounter
GetSystemTimeAsFileTime
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
HeapDestroy
HeapCreate
HeapFree
VirtualFree
FlushFileBuffers
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
GetOEMCP
GetCPInfo
IsValidCodePage
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
SetFilePointer
LCMapStringA
LCMapStringW
GetStringTypeA
GetLocaleInfoA
ReadFile
CloseHandle
CreateFileA
DeleteFileA
Sections
.text Size: 220KB - Virtual size: 219KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 70KB - Virtual size: 712KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cab Size: 512B - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kamulu Size: 512B - Virtual size: 75B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.loh Size: 512B - Virtual size: 34B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ