Static task
static1
Behavioral task
behavioral1
Sample
AF0F10C98AE7C41E1ACC114D61192F4D14F8B664F6E32.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
AF0F10C98AE7C41E1ACC114D61192F4D14F8B664F6E32.exe
Resource
win10v2004-20220812-en
General
-
Target
AF0F10C98AE7C41E1ACC114D61192F4D14F8B664F6E32.exe
-
Size
733KB
-
MD5
e42e278c877032510124006a851abe54
-
SHA1
f11a7c3d91bb96e9f8a5a808c7551cf5b0d8750b
-
SHA256
af0f10c98ae7c41e1acc114d61192f4d14f8b664f6e325113749f8b150ef81e7
-
SHA512
f21dfd56fafaf85e92c4c5fa6bffca7cac791ef6edb2b927b0de8718a5d1aedd5a9be2450c30825c99bf4c75f32e3ff72d951878a92475cfd4b8dd216cb05a7c
-
SSDEEP
12288:RUE85VGeoTznQd/PSKg7cIAzDPiOyB0X8SKf0xG781HYN/meRNBSG/n:Re5VGeoQBSlfAzDYiM5fsG781HYdR0
Malware Config
Signatures
Files
-
AF0F10C98AE7C41E1ACC114D61192F4D14F8B664F6E32.exe.exe windows x86
00f2a3dbc391eae89aa6e15e683c90da
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetHandleInformation
FreeEnvironmentStringsA
GetModuleHandleW
GetConsoleAliasesLengthA
GetCompressedFileSizeW
ReadConsoleOutputA
GetPriorityClass
GlobalAlloc
GetLocaleInfoW
IsProcessInJob
SetSystemTimeAdjustment
GetFileAttributesW
SetTimeZoneInformation
GetAtomNameW
GetModuleFileNameW
lstrcatA
GetEnvironmentVariableA
GetVolumePathNameA
SetConsoleTitleA
WritePrivateProfileStringW
InitializeSListHead
GetLastError
GetLongPathNameA
HeapSize
EnterCriticalSection
CreateMemoryResourceNotification
SetFileAttributesA
GetAtomNameA
LoadLibraryA
GetProfileStringA
BeginUpdateResourceA
GetCommMask
GetModuleHandleA
VirtualProtect
GetCurrentDirectoryA
WaitForDebugEvent
SetCalendarInfoA
GetCurrentProcessId
LCMapStringW
CompareStringW
CompareStringA
SetDefaultCommConfigW
LoadResource
WriteConsoleOutputCharacterA
GetConsoleAliasExesLengthA
SetEndOfFile
CreateJobObjectA
EnumDateFormatsExW
Sleep
GetProcAddress
ExitProcess
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetStdHandle
LeaveCriticalSection
GetFileType
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
HeapAlloc
RtlUnwind
HeapFree
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
GetStdHandle
GetModuleFileNameA
DeleteCriticalSection
FatalAppExitA
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetStartupInfoA
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
SetFilePointer
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
CloseHandle
CreateFileA
RaiseException
GetLocaleInfoA
LCMapStringA
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
FlushFileBuffers
GetProcessHeap
ReadFile
GetTimeZoneInformation
SetEnvironmentVariableA
user32
GetProcessDefaultLayout
advapi32
GetEventLogInformation
RegCreateKeyA
GetPrivateObjectSecurity
EqualSid
OpenEventLogW
PrivilegedServiceAuditAlarmW
Sections
.text Size: 689KB - Virtual size: 689KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ