Static task
static1
Behavioral task
behavioral1
Sample
314f4da13b3a43ce3eddacf01d850f36.exe
Resource
win7-20220414-en
General
-
Target
314f4da13b3a43ce3eddacf01d850f36.exe
-
Size
307KB
-
MD5
314f4da13b3a43ce3eddacf01d850f36
-
SHA1
5f70d85a6bf37e5106a099040c658a77e7003b16
-
SHA256
1cfe393c560cf7e17905bb2573ece065ffd587ffe3ec5efbbb43b326a39e3d51
-
SHA512
2336c9af1ad364435ad7b5666727d60092f03a7ca15d4e655ffad5837caf06639286f9a3edc5cfbfa9b4c79e7cd4c6f97f8fe136e98e45250e90a96e3a714014
-
SSDEEP
6144:neQaC76SjgtzRNq3EJf94ZWamwgsdl4jGh4UYvljQzQuYcOg:eQaPSUJfq3gf94QJ9MzQu
Malware Config
Signatures
Files
-
314f4da13b3a43ce3eddacf01d850f36.exe.exe windows x86
a11b347717c7542b02f2b2993b362bbe
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcatA
FindFirstChangeNotificationA
GetNamedPipeHandleStateW
GetOverlappedResult
FillConsoleOutputCharacterW
GetQueuedCompletionStatus
TerminateProcess
GetCurrentProcessId
FindNextFileA
CopyFileExA
BuildCommDCBAndTimeoutsA
EnumDateFormatsA
GetVersionExW
VirtualLock
WriteProfileStringA
VerifyVersionInfoA
GetProcessPriorityBoost
GetPriorityClass
GetCompressedFileSizeW
FindNextVolumeMountPointW
OutputDebugStringA
GetWriteWatch
WriteConsoleInputA
GetConsoleTitleA
SetComputerNameExA
GetTimeZoneInformation
LoadLibraryW
GetSystemDirectoryW
GetDriveTypeA
GetModuleHandleA
GlobalAlloc
GetShortPathNameA
ZombifyActCtx
GetProfileSectionA
DeleteFileW
GetCommandLineW
ReadConsoleOutputCharacterA
GetCalendarInfoW
ReleaseActCtx
FindResourceA
FormatMessageW
GetModuleFileNameA
CreateJobObjectW
EnterCriticalSection
SetFirmwareEnvironmentVariableA
GetDllDirectoryW
GetExitCodeThread
LoadLibraryA
WritePrivateProfileStringA
GetConsoleAliasesLengthW
WriteProfileSectionA
InterlockedDecrement
AddAtomW
UpdateResourceA
GetVersionExA
InterlockedExchangeAdd
GetStartupInfoW
ConnectNamedPipe
GetConsoleAliasExesW
DebugBreak
EndUpdateResourceA
GetLastError
GetSystemWindowsDirectoryW
GetSystemWow64DirectoryW
GetCPInfoExA
GetStringTypeExW
DeleteVolumeMountPointA
FatalAppExitA
SetSystemTime
OpenFileMappingW
lstrcmpA
SetConsoleCursorPosition
SetDefaultCommConfigW
CopyFileW
GetACP
GetCurrencyFormatA
CreateActCtxW
GetTapeParameters
GetMailslotInfo
GetConsoleAliasW
_lwrite
GetDiskFreeSpaceExW
DefineDosDeviceW
GetAtomNameA
FlushConsoleInputBuffer
EnumResourceTypesA
lstrlenW
GetLongPathNameW
CreateJobSet
WriteConsoleW
VirtualProtect
ReadConsoleOutputW
SuspendThread
FreeLibraryAndExitThread
_hwrite
BuildCommDCBW
GetStringTypeW
GetHandleInformation
GetPrivateProfileStringA
GetComputerNameW
WritePrivateProfileSectionA
WritePrivateProfileStructA
TryEnterCriticalSection
GetPrivateProfileSectionNamesA
MoveFileA
GetVolumePathNameA
SetConsoleMode
HeapWalk
FindNextFileW
ResetEvent
ReadProcessMemory
MoveFileExA
GetVersion
ChangeTimerQueueTimer
WriteConsoleInputW
InterlockedCompareExchange
GetCommMask
SetFileShortNameA
lstrcpyW
VerLanguageNameA
FreeEnvironmentStringsW
EnumDateFormatsExW
GetProfileStringA
GlobalGetAtomNameW
GetConsoleAliasesA
CreateMailslotW
SetConsoleOutputCP
MoveFileWithProgressW
GetFileInformationByHandle
GetLocalTime
FoldStringW
EnumSystemLocalesW
CallNamedPipeW
GetConsoleAliasExesLengthA
OpenSemaphoreW
GetPrivateProfileIntA
GetModuleHandleExW
WriteConsoleOutputCharacterW
SetComputerNameW
FindActCtxSectionStringW
GetTickCount
GetUserDefaultLangID
LocalLock
FindFirstVolumeW
FindClose
OpenWaitableTimerW
EnumResourceNamesA
OpenFileMappingA
GetFileType
QueueUserWorkItem
RaiseException
lstrcpynA
GlobalUnWire
GetFullPathNameW
SetThreadPriority
ReadConsoleA
AssignProcessToJobObject
CreateFileW
GetDateFormatA
DeactivateActCtx
SetCurrentDirectoryW
GetFileAttributesA
GetBinaryTypeW
SetCalendarInfoW
InterlockedIncrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
RtlUnwind
HeapValidate
IsBadReadPtr
GetProcAddress
TlsGetValue
GetModuleHandleW
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
GetStdHandle
WriteFile
OutputDebugStringW
ExitProcess
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
HeapDestroy
HeapCreate
HeapFree
VirtualFree
FlushFileBuffers
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
GetOEMCP
GetCPInfo
IsValidCodePage
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
SetFilePointer
LCMapStringA
LCMapStringW
GetStringTypeA
GetLocaleInfoA
ReadFile
CloseHandle
CreateFileA
DeleteFileA
Sections
.text Size: 220KB - Virtual size: 219KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 67KB - Virtual size: 709KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xip Size: 512B - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dejeb Size: 512B - Virtual size: 75B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.siwa Size: 512B - Virtual size: 34B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ