Static task
static1
Behavioral task
behavioral1
Sample
d4d53c64cb46b4a286bdfdecaa928ed77942d8838506356bfbb6b8da8349c191.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
d4d53c64cb46b4a286bdfdecaa928ed77942d8838506356bfbb6b8da8349c191.exe
Resource
win10v2004-20220722-en
General
-
Target
d4d53c64cb46b4a286bdfdecaa928ed77942d8838506356bfbb6b8da8349c191
-
Size
304KB
-
MD5
19e48e72c51e0e652a2b5c75db0ef9bc
-
SHA1
b4ea00205b0e611e2fc155d5ded19b22cd6341f3
-
SHA256
d4d53c64cb46b4a286bdfdecaa928ed77942d8838506356bfbb6b8da8349c191
-
SHA512
65269d693b7ddf70c76069d2a80cec73ba1f78a38b0cfcf029af5c30eca972a7b2f21c327f63ac5a17d85a7fab4008e4c04d6ba4e50561f2f71ea7ede52175e2
-
SSDEEP
6144:6V13slAMd1EHcabi6NiwnpmxKFGgTU55MlP:6VxZM3raLdnAKFGg4HMx
Malware Config
Signatures
Files
-
d4d53c64cb46b4a286bdfdecaa928ed77942d8838506356bfbb6b8da8349c191.exe windows x86
3ac8ce146435879f6c6bfa04c90d6846
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenSemaphoreW
LoadLibraryA
GetModuleFileNameW
GetProcessShutdownParameters
GetFirmwareEnvironmentVariableA
EnumResourceTypesA
EndUpdateResourceA
GetProfileStringA
GetPrivateProfileSectionNamesA
GetPrivateProfileSectionNamesW
GetCurrentDirectoryW
CreateDirectoryExW
DefineDosDeviceA
GetFileAttributesExW
DeleteFileW
CopyFileW
BackupRead
CommConfigDialogW
GetDefaultCommConfigW
OpenJobObjectA
QueryInformationJobObject
ReleaseActCtx
GetCalendarInfoW
GetSystemDefaultLCID
ReadConsoleInputW
WriteConsoleW
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
GetConsoleCP
lstrlenA
lstrcatA
lstrcpyA
lstrcmpA
CreateMailslotW
FindClose
CancelDeviceWakeupRequest
UnlockFile
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetExitCodeProcess
HeapReAlloc
HeapAlloc
VirtualAlloc
GlobalCompact
GlobalAlloc
IsBadStringPtrW
GetProcAddress
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetStdHandle
WriteFile
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
GetModuleHandleExW
GetACP
HeapFree
GetFileType
GetStringTypeW
DecodePointer
CloseHandle
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
LCMapStringW
SetStdHandle
GetProcessHeap
RaiseException
HeapSize
CreateFileW
user32
ScrollWindowEx
DrawTextA
GetMenuItemCount
IsCharAlphaNumericW
CreateWindowStationW
GetMonitorInfoW
advapi32
RegQueryValueExW
RegQueryValueA
RegOpenKeyExW
RegEnumValueW
RegEnumKeyExW
RegCreateKeyW
RegCloseKey
LookupAccountSidW
GetFileSecurityA
GetSecurityDescriptorControl
AddAccessDeniedAce
DeleteAce
GetAclInformation
AreAllAccessesGranted
ObjectPrivilegeAuditAlarmA
ClearEventLogA
RegisterServiceCtrlHandlerW
Sections
.text Size: 85KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 179KB - Virtual size: 179KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rev Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bovomez Size: 512B - Virtual size: 1B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 172B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ