Static task
static1
Behavioral task
behavioral1
Sample
d1bf01090d9ec8523bc3bd0bd9d268e396577fe8a37a85e579b9e5338a15164b.exe
Resource
win7-20220718-en
General
-
Target
d1bf01090d9ec8523bc3bd0bd9d268e396577fe8a37a85e579b9e5338a15164b
-
Size
123KB
-
MD5
d89f38e1616e1fa709356230986149b8
-
SHA1
f0c6611adde809c2d5ce7d71e08b2ed946aa5683
-
SHA256
a76ac3a649cb85ef4fdba6e02940a5bf0e53a811a1ab43daad7a3a08716a67d8
-
SHA512
a47df46ecbcc09882858afded4a4e719c31ac320b720876c2b0e38214e9fd288d7850d6f273e44a4e26cce3441a18ba210a17f60e7f7e94c5d4894a69ad72ae6
-
SSDEEP
3072:Abs68dT8fCE7EeZN/ufBSd83jJyG2+d0KRZdysN43Ts1U47dTXd:CqWCE71eBt3tRXd3RZU7TiT7tXd
Malware Config
Signatures
Files
-
d1bf01090d9ec8523bc3bd0bd9d268e396577fe8a37a85e579b9e5338a15164b.zip
-
d1bf01090d9ec8523bc3bd0bd9d268e396577fe8a37a85e579b9e5338a15164b.exe windows x86
f46eeb9c142ece79ec58fd91dc224f9f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
GetLocalTime
InterlockedDecrement
GetLocaleInfoW
InterlockedCompareExchange
_hwrite
SetWaitableTimer
GetSystemDirectoryA
CreateEventA
ReadConsoleA
BuildCommDCBA
GetConsoleAliasExesLengthA
HeapWalk
PeekConsoleInputA
EnumDateFormatsW
CreateFileA
RegisterWaitForSingleObjectEx
LoadLibraryW
VerifyVersionInfoW
WaitNamedPipeA
CreateMutexA
FindResourceExA
VirtualFree
GetFirmwareEnvironmentVariableA
BeginUpdateResourceW
WriteConsoleW
EnumCalendarInfoExA
WriteConsoleOutputCharacterW
WriteConsoleA
LocalAlloc
GetProcAddress
GetUserDefaultLangID
FindFirstChangeNotificationW
GetCalendarInfoW
SetConsoleTitleA
GetBinaryTypeA
GetSystemDefaultLCID
GetCurrentProcess
GetThreadLocale
GetComputerNameExA
FindNextFileA
OpenJobObjectW
HeapValidate
_lclose
FoldStringW
GetComputerNameW
SetFileShortNameW
FillConsoleOutputCharacterW
GetTimeZoneInformation
TlsGetValue
GetCPInfoExW
GetFileAttributesExW
SetCalendarInfoA
SetComputerNameW
GetFileAttributesA
CreateDirectoryExA
DeleteCriticalSection
GetVolumePathNameA
LoadLibraryA
SetSystemTime
WriteFile
GetStringTypeA
HeapSize
GetDiskFreeSpaceA
DeleteFileW
MultiByteToWideChar
GetCommandLineW
HeapSetInformation
GetStartupInfoW
EncodePointer
IsProcessorFeaturePresent
GetLastError
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DecodePointer
TerminateProcess
HeapFree
GetModuleHandleW
ExitProcess
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapAlloc
ReadFile
CloseHandle
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetStdHandle
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
Sleep
RtlUnwind
LCMapStringW
GetStringTypeW
RaiseException
HeapReAlloc
CreateFileW
user32
ClientToScreen
gdi32
GetBitmapBits
advapi32
BackupEventLogA
winhttp
WinHttpReadData
Sections
.text Size: 129KB - Virtual size: 129KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 32.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ