Static task
static1
Behavioral task
behavioral1
Sample
55fefbc47b2718312882b8364d75ed3f616d916545a0dd9ff31878bf1240de21.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
55fefbc47b2718312882b8364d75ed3f616d916545a0dd9ff31878bf1240de21.exe
Resource
win10v2004-20220414-en
General
-
Target
55fefbc47b2718312882b8364d75ed3f616d916545a0dd9ff31878bf1240de21
-
Size
200KB
-
MD5
7fd349a4c154e6c475ff36c430841e0e
-
SHA1
ae181cc949b84007ff6b572941947745ea3091a2
-
SHA256
55fefbc47b2718312882b8364d75ed3f616d916545a0dd9ff31878bf1240de21
-
SHA512
1751ba59eeacec611e775d0e22f334a8c6e76c2f1dd82ca8742171d470190f2ab758d242884c7fe4de2b7b0738b5cea3a59b5e6eccd84cc4ecf6e2228de19179
-
SSDEEP
3072:54Kil4SReWaig0qsL6GBliiUh/ObnZVUYiKNvBNhs5of3:5fiGSRel0v6KlxU98ZVUYiMpDf3
Malware Config
Signatures
Files
-
55fefbc47b2718312882b8364d75ed3f616d916545a0dd9ff31878bf1240de21.exe windows x86
cf7d0065e68e1e69b3b12b656d48f241
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_AGGRESIVE_WS_TRIM
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapReAlloc
SetVolumeLabelA
IsBadStringPtrW
WriteConsoleOutputCharacterW
GetDefaultCommConfigW
GetProcessIoCounters
ClearCommError
SetConsoleScreenBufferSize
GetNumaAvailableMemoryNode
GetTickCount
GetWindowsDirectoryA
GetPriorityClass
GetThreadSelectorEntry
_hread
SizeofResource
GetMailslotInfo
CompareStringW
MultiByteToWideChar
lstrlenW
FindFirstFileExA
GetEnvironmentVariableW
GetLongPathNameW
GetProcAddress
EnumDateFormatsExA
EnumSystemCodePagesW
SetFileApisToOEM
GetAtomNameA
LoadLibraryA
GetProcessWorkingSetSize
FindFirstVolumeMountPointW
SetConsoleCtrlHandler
GetModuleFileNameA
CreateIoCompletionPort
VirtualProtect
SetCalendarInfoA
GetVolumeNameForVolumeMountPointW
GetCurrentProcessId
ResetWriteWatch
FindNextVolumeA
GetLastError
GetFullPathNameW
GetCommandLineA
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleW
Sleep
ExitProcess
WriteFile
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
RaiseException
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapAlloc
VirtualAlloc
InitializeCriticalSectionAndSpinCount
SetStdHandle
RtlUnwind
FlushFileBuffers
GetModuleHandleA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
CreateFileA
CloseHandle
user32
GetCaretPos
advapi32
RegisterEventSourceW
Sections
.text Size: 95KB - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 705KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.yeg Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.joke Size: 1024B - Virtual size: 855B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hahel Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pus Size: 1KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ