Static task
static1
Behavioral task
behavioral1
Sample
caf1bf6339d21c8bf3451420e78097bf7c8fa0a6baad42afa9a4f32981864120.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
caf1bf6339d21c8bf3451420e78097bf7c8fa0a6baad42afa9a4f32981864120.exe
Resource
win10v2004-20220414-en
General
-
Target
caf1bf6339d21c8bf3451420e78097bf7c8fa0a6baad42afa9a4f32981864120
-
Size
293KB
-
MD5
a0d0319e501904cd74e51782e1ab74f9
-
SHA1
b8f7c45ecf8aaabccff860356f03ef02b65f12f6
-
SHA256
caf1bf6339d21c8bf3451420e78097bf7c8fa0a6baad42afa9a4f32981864120
-
SHA512
3cc308094f4dbacd5f9aabc45d074e0b0af08676a694cb2e2898d1880646b22a0b64bbc0211ebf53fea7e6de34c631df6d5632c834298e432f804f7b8f593f10
-
SSDEEP
6144:h1CNj15l22sgaqElYgIICt0esNuQMsWxMq/A7luiRFdmTKCP0lK8:GNJ5l21gaRxgsEk4iR7mGH
Malware Config
Signatures
Files
-
caf1bf6339d21c8bf3451420e78097bf7c8fa0a6baad42afa9a4f32981864120.exe windows x86
c926e9203bb04c00da9ce9685a173c61
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessTimes
GlobalAlloc
lstrcmpW
GlobalUnlock
GetStringTypeExA
LCMapStringA
EnumSystemLocalesA
GetLastError
GetProcAddress
GetCommandLineA
GetPrivateProfileStringA
GetAtomNameA
LoadLibraryA
GetProcessId
GetTapeParameters
DebugSetProcessKillOnExit
SetConsoleTitleW
BuildCommDCBA
GetConsoleCursorInfo
GetCurrentProcessId
OpenFileMappingA
WriteFile
GetCurrencyFormatA
ReadConsoleW
GetTickCount
SetTapeParameters
BackupSeek
CreateHardLinkA
GetNamedPipeHandleStateA
CompareFileTime
LoadResource
DebugActiveProcessStop
lstrlenA
IsBadStringPtrW
FindFirstFileW
CreateTimerQueue
CreateFileA
DosDateTimeToFileTime
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetStartupInfoA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleFileNameW
HeapValidate
IsBadReadPtr
RaiseException
RtlUnwind
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
GetModuleHandleW
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapDestroy
HeapCreate
HeapFree
VirtualFree
FlushFileBuffers
GetConsoleCP
GetConsoleMode
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
LoadLibraryW
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
InitializeCriticalSectionAndSpinCount
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
MultiByteToWideChar
SetFilePointer
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CloseHandle
advapi32
GetLengthSid
GetSecurityDescriptorSacl
RegLoadKeyA
GetNumberOfEventLogRecords
DeregisterEventSource
RegSetValueExA
SetServiceObjectSecurity
OpenServiceA
Sections
.text Size: 219KB - Virtual size: 219KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 192KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ