Behavioral task
behavioral1
Sample
0x0008000000012326-139.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0x0008000000012326-139.exe
Resource
win10v2004-20220812-en
General
-
Target
0x0008000000012326-139.dat
-
Size
840KB
-
MD5
4a1a271c67b98c9cfc4c6efa7411b1dd
-
SHA1
e2325cb6f55d5fea29ce0d31cad487f2b4e6f891
-
SHA256
3c33e130ffc0a583909982f29c38bffb518ae0fd0ef7397855906beef3cd993d
-
SHA512
e9fc716c03a5f8a327ac1e68336ed0901864b9629dcfd0a32efe406cdfc571c1bd01012aa373d2ad993d9ae4820044963a1f4cd2ba7ebe5a4b53b143b7b7a2c2
-
SSDEEP
24576:/kRkLis0EC5vKcYE52sYAt2rKzTmExr8:570nFNYwzTLxr8
Malware Config
Signatures
-
Privateloader family
Files
-
0x0008000000012326-139.dat.exe windows x86
82622a0f8bdba4396a94457d8c2772ea
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointer
CreateFileW
GetLastError
CreateFileA
CloseHandle
FindClose
lstrcatA
GetModuleHandleA
Sleep
GlobalAlloc
lstrcpyA
VerSetConditionMask
WideCharToMultiByte
VerifyVersionInfoW
GetSystemTimeAsFileTime
GetProcAddress
HeapFree
lstrlenA
HeapAlloc
lstrcpynA
GetProcessHeap
InitializeSListHead
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetCurrentProcess
TerminateProcess
FormatMessageW
CreateDirectoryW
DeleteFileW
FindFirstFileExW
GetFileAttributesExW
GetFileInformationByHandle
SetEndOfFile
SetFilePointerEx
WriteFile
AreFileApisANSI
SetLastError
MultiByteToWideChar
QueryPerformanceFrequency
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EncodePointer
DecodePointer
GetCPInfo
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCurrentThread
GetThreadTimes
InterlockedPushEntrySList
RaiseException
RtlUnwind
FreeLibrary
LoadLibraryExW
GetFileType
ExitProcess
GetModuleHandleExW
SetEnvironmentVariableA
SetCurrentDirectoryA
GetCurrentDirectoryA
GetModuleFileNameA
GetStdHandle
GetACP
GetConsoleMode
ReadConsoleW
GetConsoleCP
SetStdHandle
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
HeapReAlloc
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
WriteConsoleW
HeapSize
ReadFile
user32
CharNextA
advapi32
CryptReleaseContext
Sections
.text Size: 614KB - Virtual size: 613KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ