Static task
static1
Behavioral task
behavioral1
Sample
644027ad9bc91f6269af1123065edab07ed24aba1eff1cd3d43aa3237ae3bb2b.exe
Resource
win10v2004-20220812-en
General
-
Target
644027ad9bc91f6269af1123065edab07ed24aba1eff1cd3d43aa3237ae3bb2b
-
Size
250KB
-
MD5
6eaaf05771168777adbb4035c6418f3c
-
SHA1
37a5c58e27b17a4b066d363bacbd8a68c7920eaa
-
SHA256
644027ad9bc91f6269af1123065edab07ed24aba1eff1cd3d43aa3237ae3bb2b
-
SHA512
21a3fc717239628807fbb86ef998693d5fad2bb5eeb107b7c931a3f2043163a9b373d2f09c9141e0929b2df7c77709bbf57814635ebf028138fa0f73a23bd6ef
-
SSDEEP
6144:qLJsTNYD1lkzfgJnc5O/73lTGi+T1Xs0:quT2D1lkzfgS5O/RTGZc
Malware Config
Signatures
Files
-
644027ad9bc91f6269af1123065edab07ed24aba1eff1cd3d43aa3237ae3bb2b.exe windows x86
4ae7ee6b0bcbb268f65086a4a9e905fa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MoveFileWithProgressW
GetProfileSectionA
VerifyVersionInfoA
LocalFree
GetProcessPriorityBoost
FindFirstChangeNotificationW
GlobalGetAtomNameW
FindResourceExW
GetComputerNameExW
GetModuleHandleW
GetTempPathA
BuildCommDCBAndTimeoutsA
GetProcAddress
GetModuleHandleA
VirtualUnlock
GetTapeParameters
LockFile
GetAtomNameA
SetConsoleScreenBufferSize
SetProcessAffinityMask
EnumResourceLanguagesW
GetCPInfoExA
SetThreadContext
lstrlenA
GetProcessAffinityMask
SetConsoleCtrlHandler
GlobalGetAtomNameA
SetInformationJobObject
lstrcpynA
WriteConsoleA
MoveFileWithProgressA
GetBinaryTypeA
GetLastError
GetCommandLineA
InterlockedDecrement
GetCalendarInfoA
GetConsoleTitleA
CreateActCtxW
FormatMessageA
InitializeCriticalSection
FindNextVolumeA
GetCurrentConsoleFont
LoadLibraryA
GetConsoleAliasW
LoadLibraryW
ExitProcess
CopyFileExA
LeaveCriticalSection
EnumSystemLocalesW
OpenMutexA
FileTimeToLocalFileTime
SearchPathA
GetProcessShutdownParameters
FindResourceA
FormatMessageW
VerifyVersionInfoW
CreateIoCompletionPort
GetPrivateProfileStructW
CreateFiber
InterlockedExchange
EnumDateFormatsW
FindResourceExA
InterlockedIncrement
FindActCtxSectionGuid
SetConsoleCursorInfo
UnregisterWait
FoldStringW
LocalAlloc
GetFileType
GetNumberOfConsoleInputEvents
SetDefaultCommConfigW
SetLastError
GetMailslotInfo
GetSystemDefaultUILanguage
GetFileAttributesA
GetSystemWindowsDirectoryA
GetAtomNameW
GetComputerNameA
ReadConsoleInputA
EnumTimeFormatsA
_hwrite
GetConsoleAliasA
lstrcatA
GetFullPathNameW
DebugSetProcessKillOnExit
AddAtomA
SetCurrentDirectoryW
SetCalendarInfoA
HeapAlloc
FindNextChangeNotification
DeleteFileA
RaiseException
GetStartupInfoW
HeapValidate
IsBadReadPtr
DeleteCriticalSection
EnterCriticalSection
GetModuleFileNameW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetFilePointer
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetStdHandle
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
HeapDestroy
HeapCreate
HeapFree
VirtualFree
GetModuleFileNameA
WriteFile
HeapSize
HeapReAlloc
VirtualAlloc
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
RtlUnwind
InitializeCriticalSectionAndSpinCount
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
SetStdHandle
FlushFileBuffers
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetConsoleOutputCP
CloseHandle
CreateFileA
user32
CharUpperW
GetMessageTime
LoadMenuA
gdi32
SelectObject
Sections
.text Size: 150KB - Virtual size: 150KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 67KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.watama Size: 512B - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lazusa Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ