Static task
static1
Behavioral task
behavioral1
Sample
d58258f9f6972729808031118cf33714a2fad1a64c34cc1693640b1a74bed3af.exe
Resource
win10v2004-20220414-en
General
-
Target
d58258f9f6972729808031118cf33714a2fad1a64c34cc1693640b1a74bed3af
-
Size
359KB
-
MD5
df63834591c08e86c68c68a04c4a0f90
-
SHA1
48743959f09b1f081c14c35db9d4ca0f847f3a92
-
SHA256
d58258f9f6972729808031118cf33714a2fad1a64c34cc1693640b1a74bed3af
-
SHA512
be06a12d9b8ed77c08aad3227576e40d9511f9c257734bfb70b6ee1fa9fa636ade9ff5e3735e2b755d0ef1ad43908c70f1b15a073d64b5986b0e1456a3113571
-
SSDEEP
6144:zMQwzKftWBoN4KzD387xS5dXtFKrsB6FHVFwjZdSLK4iVpU6i7IRMI:z4zmtzN4WD39dXtFgsB2HVFwjHSLriVH
Malware Config
Signatures
Files
-
d58258f9f6972729808031118cf33714a2fad1a64c34cc1693640b1a74bed3af.exe windows x86
1dcd43cda7ce111aecfd9cc0aa6898f9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
ExitProcess
ResumeThread
CreateProcessA
GetThreadContext
SetThreadContext
VirtualAlloc
VirtualAllocEx
ReadProcessMemory
WriteProcessMemory
GetModuleFileNameA
LocalAlloc
IsDebuggerPresent
CheckRemoteDebuggerPresent
GetCurrentProcess
GetSystemInfo
RaiseException
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
TryEnterCriticalSection
DeleteCriticalSection
GetCurrentThreadId
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableCS
SleepConditionVariableSRW
InitOnceBeginInitialize
InitOnceComplete
GetLastError
FreeLibraryWhenCallbackReturns
CreateThreadpoolWork
SubmitThreadpoolWork
CloseThreadpoolWork
GetModuleHandleExW
IsProcessorFeaturePresent
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
CloseHandle
WaitForSingleObjectEx
LocalFree
WriteConsoleW
CreateFileW
HeapReAlloc
HeapSize
DecodePointer
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
GetStringTypeW
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
CreateEventW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
TerminateProcess
GetCurrentProcessId
InitializeSListHead
RtlUnwind
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetModuleFileNameW
GetStdHandle
WriteFile
HeapFree
HeapAlloc
LCMapStringW
GetFileType
SetFilePointerEx
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
mscoree
CLRCreateInstance
oleaut32
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreate
SysAllocString
SafeArrayPutElement
Sections
.text Size: 308KB - Virtual size: 308KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ