_ExportFuncs@4
Static task
static1
Behavioral task
behavioral1
Sample
f3bf887159da411617802401a2717d87c35da3154ce52dafc810c56e11e2a483.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
f3bf887159da411617802401a2717d87c35da3154ce52dafc810c56e11e2a483.exe
Resource
win10v2004-20220414-en
General
-
Target
f3bf887159da411617802401a2717d87c35da3154ce52dafc810c56e11e2a483
-
Size
149KB
-
MD5
cfc21859ce2755999865f9ab8268131a
-
SHA1
2cb310b57b6d27125270af16b2cde9940088c052
-
SHA256
f3bf887159da411617802401a2717d87c35da3154ce52dafc810c56e11e2a483
-
SHA512
1a6a953dbb4069ef9315fa2e010f893854273628e735fe4453df8a9dc33e4584c8c0d3f4c8d080a488da7f6fc4f544e7745dc574d8762b4a9ab96b39dabe3a14
-
SSDEEP
3072:EJh0j/hlsfeZSrUbwcNQ/DXCanyiOEdcZwmANKCD5oDyOMb90C:E/00CbayQdcZ6NKvC
Malware Config
Signatures
Files
-
f3bf887159da411617802401a2717d87c35da3154ce52dafc810c56e11e2a483.exe windows x86
e9f90f9bb9a5550b2369afa820f25601
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_AGGRESIVE_WS_TRIM
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnterCriticalSection
GetCurrentProcess
GetShortPathNameW
SetEvent
VirtualProtect
AddConsoleAliasA
RemoveDirectoryA
GetFileType
GlobalAlloc
GetOEMCP
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwind
GetLastError
SetLastError
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetStdHandle
WriteFile
GetModuleFileNameW
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
GetModuleHandleExW
GetACP
HeapFree
HeapAlloc
SetStdHandle
GetConsoleCP
GetConsoleMode
CloseHandle
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
GetStringTypeW
GetProcessHeap
SetFilePointerEx
WriteConsoleW
HeapSize
HeapReAlloc
CreateFileW
FlushFileBuffers
DecodePointer
RaiseException
advapi32
RegisterEventSourceW
Exports
Exports
Sections
.text Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 172B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 37KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ