Static task
static1
Behavioral task
behavioral1
Sample
d3a141946f77c9ef46276273a571043cebb974dd6aaa75d5d8d48ca3e5995dc2.exe
Resource
win10v2004-20220812-en
General
-
Target
d3a141946f77c9ef46276273a571043cebb974dd6aaa75d5d8d48ca3e5995dc2
-
Size
279KB
-
MD5
22a17c0d4117c470fb70bdc1aae7381c
-
SHA1
83c14e40717de27168e49d60da19170cb7a0792f
-
SHA256
d3a141946f77c9ef46276273a571043cebb974dd6aaa75d5d8d48ca3e5995dc2
-
SHA512
09be5c5c63358a028bb4291ae565c5527339701f22aeac579df04eb5a4bc9de35cbb81840a9f4925ad3879edd0ef68a7ca0d1e25184b624a27ed4b2bfc4168b4
-
SSDEEP
6144:vZApVmYEhW6TTt0BT6bqAoJulpztdCQLt:vYVmthW6TTK6bqAoJuDJL
Malware Config
Signatures
Files
-
d3a141946f77c9ef46276273a571043cebb974dd6aaa75d5d8d48ca3e5995dc2.exe windows x86
b6bedcb856f1ec78742547ac6d88521a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProfileSectionW
VerifyVersionInfoA
LocalFree
GetProcessPriorityBoost
FindFirstChangeNotificationW
GlobalGetAtomNameA
FindResourceExW
GetComputerNameExW
GetModuleHandleW
GetTempPathA
BuildCommDCBAndTimeoutsA
GetProcAddress
GetModuleHandleA
VirtualUnlock
GetTapeParameters
LockFile
GetAtomNameA
SetConsoleScreenBufferSize
SetProcessAffinityMask
EnumResourceLanguagesW
GetCPInfoExA
SetThreadContext
lstrlenA
GetProcessAffinityMask
SetConsoleCtrlHandler
GlobalGetAtomNameW
SetInformationJobObject
lstrcpynA
WriteConsoleA
MoveFileWithProgressA
GetBinaryTypeA
GetLastError
GetCommandLineA
GetCalendarInfoA
GetConsoleTitleA
SearchPathA
CreateActCtxA
FormatMessageA
InitializeCriticalSection
FindNextVolumeA
GetCurrentConsoleFont
LoadLibraryA
GetConsoleAliasW
LoadLibraryW
ExitProcess
MoveFileWithProgressW
LeaveCriticalSection
EnumSystemLocalesW
OpenMutexA
FileTimeToLocalFileTime
SearchPathW
GetProcessShutdownParameters
FindResourceA
FormatMessageW
CreateIoCompletionPort
GetPrivateProfileStructW
CreateFiber
InterlockedExchange
EnumDateFormatsA
FindResourceExA
InterlockedIncrement
FindActCtxSectionGuid
SetConsoleCursorInfo
UnregisterWait
FoldStringW
LocalAlloc
GetFileType
GetNumberOfConsoleInputEvents
GetProfileSectionA
SetDefaultCommConfigW
SetLastError
GetMailslotInfo
GetSystemDefaultUILanguage
GetFileAttributesA
GetSystemWindowsDirectoryA
GetAtomNameW
GetComputerNameA
ReadConsoleInputA
EnumTimeFormatsA
GetPrivateProfileStructA
_hwrite
GetConsoleAliasA
lstrcatA
GetFullPathNameW
DebugSetProcessKillOnExit
AddAtomA
SetCurrentDirectoryW
SetCalendarInfoA
CopyFileExA
HeapAlloc
FindNextChangeNotification
DeleteFileA
RaiseException
GetStartupInfoW
HeapValidate
IsBadReadPtr
DeleteCriticalSection
EnterCriticalSection
GetModuleFileNameW
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
InterlockedDecrement
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetStdHandle
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
HeapDestroy
HeapCreate
HeapFree
VirtualFree
GetModuleFileNameA
WriteFile
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
HeapSize
HeapReAlloc
VirtualAlloc
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
RtlUnwind
InitializeCriticalSectionAndSpinCount
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetFilePointer
GetConsoleCP
GetConsoleMode
SetStdHandle
GetConsoleOutputCP
CreateFileA
CloseHandle
FlushFileBuffers
user32
CharUpperW
gdi32
GetCharWidthW
SelectObject
Sections
.text Size: 177KB - Virtual size: 176KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 68KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bur Size: 512B - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.wak Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ