Static task
static1
Behavioral task
behavioral1
Sample
90bcabce2aac7474901d763ae239d93c376fe1869aaf40c8242011fb077e8827.exe
Resource
win10-20220901-en
General
-
Target
90bcabce2aac7474901d763ae239d93c376fe1869aaf40c8242011fb077e8827
-
Size
280KB
-
MD5
8fcad97aa3048165dc57ef91adb75ec5
-
SHA1
1ef5d0d2df8c86f3288f243f9709bd49df5c7ac9
-
SHA256
90bcabce2aac7474901d763ae239d93c376fe1869aaf40c8242011fb077e8827
-
SHA512
17ca9e295d2de681657ba8c64f7597f4b1f8844fc300510871f130e16a8d06375b510baaa264f9a009cd20e2e204505a8352a131009a39fe723c4efe0d3f0f5f
-
SSDEEP
6144:bdGiwkyYLjUMvitEu5NczriQYYfedI7ud5JV:bdkkyCjUMviVczriQYXdR7J
Malware Config
Signatures
Files
-
90bcabce2aac7474901d763ae239d93c376fe1869aaf40c8242011fb077e8827.exe windows x86
b6bedcb856f1ec78742547ac6d88521a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProfileSectionW
VerifyVersionInfoA
LocalFree
GetProcessPriorityBoost
FindFirstChangeNotificationW
GlobalGetAtomNameA
FindResourceExW
GetComputerNameExW
GetModuleHandleW
GetTempPathA
BuildCommDCBAndTimeoutsA
GetProcAddress
GetModuleHandleA
VirtualUnlock
GetTapeParameters
LockFile
GetAtomNameA
SetConsoleScreenBufferSize
SetProcessAffinityMask
EnumResourceLanguagesW
GetCPInfoExA
SetThreadContext
lstrlenA
GetProcessAffinityMask
SetConsoleCtrlHandler
GlobalGetAtomNameW
SetInformationJobObject
lstrcpynA
WriteConsoleA
MoveFileWithProgressA
GetBinaryTypeA
GetLastError
GetCommandLineA
GetCalendarInfoA
GetConsoleTitleA
SearchPathA
CreateActCtxA
FormatMessageA
InitializeCriticalSection
FindNextVolumeA
GetCurrentConsoleFont
LoadLibraryA
GetConsoleAliasW
LoadLibraryW
ExitProcess
MoveFileWithProgressW
LeaveCriticalSection
EnumSystemLocalesW
OpenMutexA
FileTimeToLocalFileTime
SearchPathW
GetProcessShutdownParameters
FindResourceA
FormatMessageW
CreateIoCompletionPort
GetPrivateProfileStructW
CreateFiber
InterlockedExchange
EnumDateFormatsA
FindResourceExA
InterlockedIncrement
FindActCtxSectionGuid
SetConsoleCursorInfo
UnregisterWait
FoldStringW
LocalAlloc
GetFileType
GetNumberOfConsoleInputEvents
GetProfileSectionA
SetDefaultCommConfigW
SetLastError
GetMailslotInfo
GetSystemDefaultUILanguage
GetFileAttributesA
GetSystemWindowsDirectoryA
GetAtomNameW
GetComputerNameA
ReadConsoleInputA
EnumTimeFormatsA
GetPrivateProfileStructA
_hwrite
GetConsoleAliasA
lstrcatA
GetFullPathNameW
DebugSetProcessKillOnExit
AddAtomA
SetCurrentDirectoryW
SetCalendarInfoA
CopyFileExA
HeapAlloc
FindNextChangeNotification
DeleteFileA
RaiseException
GetStartupInfoW
HeapValidate
IsBadReadPtr
DeleteCriticalSection
EnterCriticalSection
GetModuleFileNameW
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
InterlockedDecrement
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetStdHandle
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
HeapDestroy
HeapCreate
HeapFree
VirtualFree
GetModuleFileNameA
WriteFile
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
HeapSize
HeapReAlloc
VirtualAlloc
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
RtlUnwind
InitializeCriticalSectionAndSpinCount
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetFilePointer
GetConsoleCP
GetConsoleMode
SetStdHandle
GetConsoleOutputCP
CreateFileA
CloseHandle
FlushFileBuffers
user32
CharUpperW
gdi32
GetCharWidthW
SelectObject
Sections
.text Size: 177KB - Virtual size: 176KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 68KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zesubo Size: 512B - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.yesucu Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ