Static task
static1
Behavioral task
behavioral1
Sample
4e62177e152df260302ef8589b66fd9f.exe
Resource
win7-20220414-en
General
-
Target
4e62177e152df260302ef8589b66fd9f
-
Size
280KB
-
MD5
4e62177e152df260302ef8589b66fd9f
-
SHA1
38e11713914838cde352769ce519733f02b3988d
-
SHA256
aa8f006488f4a54fbd1e107afcc3bcc08bca5233fe9cf9a9f8b441965859da24
-
SHA512
c453dfcf8cf70cc70b51deaac274f5ea80088ff7e1d305fc21be800683dc01a3fc3cc408387059051a1b1148f34b9e2f5425e13d09cc22f6030ae402be204e68
-
SSDEEP
6144:smcl5VwNI+mK5ZqUNNWEREg3m5hGBNkMGONNT:shlQNIubqUNNWE9W5hGBNfGAT
Malware Config
Signatures
Files
-
4e62177e152df260302ef8589b66fd9f.exe windows x86
eab7d550b9cdca5c6bd9023d54b79da8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenProcess
GetNamedPipeHandleStateA
GetQueuedCompletionStatus
FillConsoleOutputCharacterA
EnumSystemCodePagesW
LocalLock
GetVolumeNameForVolumeMountPointA
GetVersionExA
VerifyVersionInfoA
WriteConsoleInputW
EnumDateFormatsA
FindNextFileA
CopyFileExW
BuildCommDCBAndTimeoutsA
VirtualLock
WriteProfileStringA
VerifyVersionInfoW
GetDriveTypeW
GetFileInformationByHandle
DeleteFileA
FindNextVolumeMountPointW
TlsGetValue
ResetWriteWatch
GetConsoleTitleW
GetComputerNameExW
GetTimeZoneInformation
GetModuleHandleA
GetSystemDirectoryA
GetDriveTypeA
LoadLibraryA
GetShortPathNameW
ReleaseActCtx
GetProfileSectionW
DeleteFileW
GetCommandLineA
InterlockedExchangeAdd
InterlockedDecrement
CreateActCtxW
FindResourceA
FormatMessageA
GetModuleFileNameA
CreateJobObjectW
InitializeCriticalSection
GetNumberOfConsoleMouseButtons
FindNextVolumeA
CreateNamedPipeW
WritePrivateProfileStringA
GetConsoleAliasesLengthW
WriteProfileSectionW
AddAtomA
InterlockedIncrement
GetVersionExW
HeapFree
_hread
InterlockedCompareExchange
GetStartupInfoW
ConnectNamedPipe
GetCPInfoExA
GetSystemWow64DirectoryW
GetLastError
GetPrivateProfileIntW
GetConsoleAliasExesW
DebugBreak
EndUpdateResourceA
GetTickCount
VirtualQueryEx
DeleteVolumeMountPointA
OpenFileMappingA
GetModuleHandleW
SetDefaultCommConfigA
VirtualAlloc
GetSystemWindowsDirectoryA
TerminateProcess
GetACP
GetDiskFreeSpaceExA
EnumResourceTypesA
IsProcessInJob
lstrcpynW
WriteConsoleW
GetProcAddress
lstrcpyA
LoadLibraryW
ReadConsoleOutputW
SetHandleInformation
WritePrivateProfileSectionA
DeleteCriticalSection
GetFileAttributesA
DeactivateActCtx
CopyFileW
GlobalMemoryStatus
SetTapeParameters
GetDevicePowerState
ResetEvent
LockFile
MoveFileA
DisableThreadLibraryCalls
GetOverlappedResult
SetCommTimeouts
GlobalAlloc
SetThreadPriorityBoost
SetFileShortNameW
GetFileAttributesW
SetCalendarInfoA
ConvertFiberToThread
GetConsoleTitleA
SetComputerNameW
GetConsoleAliasesA
SetConsoleOutputCP
MoveFileWithProgressW
GetStdHandle
GetLocalTime
EnumSystemLocalesW
ActivateActCtx
OpenSemaphoreA
GetModuleHandleExA
FoldStringW
GetFileSize
SetUnhandledExceptionFilter
GetConsoleAliasesLengthA
SetProcessShutdownParameters
lstrcpynA
GlobalUnWire
FillConsoleOutputCharacterW
GetCompressedFileSizeA
ReadConsoleA
FreeUserPhysicalPages
WriteConsoleOutputCharacterW
TerminateJobObject
CreateFileA
SetTimerQueueTimer
SetLastError
UnhandledExceptionFilter
RaiseException
GetStartupInfoA
HeapValidate
IsBadReadPtr
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
GetCurrentProcess
IsDebuggerPresent
CloseHandle
SetStdHandle
GetFileType
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
Sleep
ExitProcess
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
TlsAlloc
TlsSetValue
TlsFree
HeapDestroy
HeapCreate
VirtualFree
HeapAlloc
HeapSize
HeapReAlloc
GetOEMCP
GetCPInfo
IsValidCodePage
RtlUnwind
InitializeCriticalSectionAndSpinCount
OutputDebugStringA
OutputDebugStringW
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
MultiByteToWideChar
SetFilePointer
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
Sections
.text Size: 186KB - Virtual size: 186KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 71KB - Virtual size: 6.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tum Size: 512B - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.guy Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sowiw Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sijo Size: 512B - Virtual size: 50B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ