Static task
static1
Behavioral task
behavioral1
Sample
68839c313f30b90541be40d8d7cbe2d8cab9ad6f507547178107d1534ff116bf.exe
Resource
win10-20220414-en
General
-
Target
68839c313f30b90541be40d8d7cbe2d8cab9ad6f507547178107d1534ff116bf
-
Size
359KB
-
MD5
467ea3d36c339565985d07a50342c8cb
-
SHA1
0a04b248297f3334c5ea31a43fa2ef2ff0eb2db8
-
SHA256
68839c313f30b90541be40d8d7cbe2d8cab9ad6f507547178107d1534ff116bf
-
SHA512
8136f125e78180a2f03f07af3bc565228b2e783047a1541ef14c8740b9a1dc858a9e5cf98af0e95432980e8953ff63a2bd6fad48dfc30b20473c4b1b760a851c
-
SSDEEP
6144:APCqd8MVpLWKKEyt0M+orr+R4vkRGeMFYaLs+Bwuh9VFwjZdSLK4iVpU6isRMI:APCqMKKEY0M+oH1vkEeM/Ls+Kuh9VFwz
Malware Config
Signatures
Files
-
68839c313f30b90541be40d8d7cbe2d8cab9ad6f507547178107d1534ff116bf.exe windows x86
1dcd43cda7ce111aecfd9cc0aa6898f9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
ExitProcess
ResumeThread
CreateProcessA
GetThreadContext
SetThreadContext
VirtualAlloc
VirtualAllocEx
ReadProcessMemory
WriteProcessMemory
GetModuleFileNameA
LocalAlloc
IsDebuggerPresent
CheckRemoteDebuggerPresent
GetCurrentProcess
GetSystemInfo
RaiseException
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
TryEnterCriticalSection
DeleteCriticalSection
GetCurrentThreadId
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableCS
SleepConditionVariableSRW
InitOnceBeginInitialize
InitOnceComplete
GetLastError
FreeLibraryWhenCallbackReturns
CreateThreadpoolWork
SubmitThreadpoolWork
CloseThreadpoolWork
GetModuleHandleExW
IsProcessorFeaturePresent
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
CloseHandle
WaitForSingleObjectEx
LocalFree
WriteConsoleW
CreateFileW
HeapReAlloc
HeapSize
DecodePointer
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
GetStringTypeW
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
CreateEventW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
TerminateProcess
GetCurrentProcessId
InitializeSListHead
RtlUnwind
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetModuleFileNameW
GetStdHandle
WriteFile
HeapFree
HeapAlloc
LCMapStringW
GetFileType
SetFilePointerEx
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
mscoree
CLRCreateInstance
oleaut32
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreate
SysAllocString
SafeArrayPutElement
Sections
.text Size: 308KB - Virtual size: 308KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ