_ExportFuncs@4
Static task
static1
Behavioral task
behavioral1
Sample
649a1862c2a11d0ca8ac0efd1b4dbe3ca63db4f674d05f01b358c0ddb2af454b.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
649a1862c2a11d0ca8ac0efd1b4dbe3ca63db4f674d05f01b358c0ddb2af454b.exe
Resource
win10v2004-20220721-en
General
-
Target
649a1862c2a11d0ca8ac0efd1b4dbe3ca63db4f674d05f01b358c0ddb2af454b
-
Size
310KB
-
MD5
df0762d26307d82d0b0add2a0d3c82d6
-
SHA1
f2bef1752449e6aba38d1a2125449c9da5bf0bfa
-
SHA256
649a1862c2a11d0ca8ac0efd1b4dbe3ca63db4f674d05f01b358c0ddb2af454b
-
SHA512
25d30bafd37bd1273c3c50013f83eb6d70ce2f4b60608cd929f6ccd4e60d8a6e5fc05b0b5dbd4987a3dfb56467c17963cd9f2b29f84d7d7e30bb6b6375b1dca5
-
SSDEEP
3072:PmCyMhXLyR1JAx8hFdBbv1hQAes09xPHnoIcTPd1ln8ehf1K4MYSeF8CZBfL3Mmv:n7u/d+b3nnCteK5AaD
Malware Config
Signatures
Files
-
649a1862c2a11d0ca8ac0efd1b4dbe3ca63db4f674d05f01b358c0ddb2af454b.exe windows x86
9c2c4951b7cfceec54346bb15acb2d29
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualQuery
GetThreadPriority
GetLastError
VirtualProtect
AddAtomA
MapUserPhysicalPagesScatter
FoldStringA
AddConsoleAliasW
DisconnectNamedPipe
LocalAlloc
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
GetCurrentProcess
TerminateProcess
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
RtlUnwind
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
GetStdHandle
WriteFile
GetACP
HeapFree
HeapAlloc
GetFileType
LCMapStringW
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
CloseHandle
SetStdHandle
GetStringTypeW
ReadFile
GetConsoleMode
ReadConsoleW
HeapSize
HeapReAlloc
FlushFileBuffers
GetConsoleCP
SetFilePointerEx
WriteConsoleW
DecodePointer
CreateFileW
RaiseException
advapi32
CreateProcessAsUserA
Exports
Exports
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 205KB - Virtual size: 49.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vedixoc Size: 1KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 172B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ