Static task
static1
Behavioral task
behavioral1
Sample
f1108b63d57490d119efb1423623ecba9831aff6fd0b8527bd7c9ec6a10a559b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f1108b63d57490d119efb1423623ecba9831aff6fd0b8527bd7c9ec6a10a559b.exe
Resource
win10v2004-20220812-en
General
-
Target
f1108b63d57490d119efb1423623ecba9831aff6fd0b8527bd7c9ec6a10a559b
-
Size
2.7MB
-
MD5
d4a1fca54cf46fef07d1e901c19c3736
-
SHA1
f64fb345d2104113af0fff927ee06c3ea8da64fb
-
SHA256
f1108b63d57490d119efb1423623ecba9831aff6fd0b8527bd7c9ec6a10a559b
-
SHA512
e601d7c4feeaa7fcdca47e6ee053a56b0a0ccf1722ed73f9577d0f6c7ec6e08069a88895fe6db1eeb10427ddf3930e0a3affdfb83ab0998325ac5c49f8844f70
-
SSDEEP
24576:Y2nUOkgCVgovyAWAxK5KmCKfBJ2jg2nBOmdY6VC1Dmq6i3p6xlTwdFb1dZ/a6D6:ZnU91VRuHUjLBdBVwKRMdFb1X/a6u
Malware Config
Signatures
Files
-
f1108b63d57490d119efb1423623ecba9831aff6fd0b8527bd7c9ec6a10a559b.exe windows x86
0dde438900742d17dc13bc7c9a4ea442
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetPrivateProfileStringA
GetPrivateProfileIntA
LoadLibraryA
GetProcAddress
GetModuleFileNameA
GetCurrentProcess
Sleep
SetConsoleCtrlHandler
CloseHandle
FormatMessageW
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
GetModuleHandleW
MultiByteToWideChar
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
SetEvent
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
RaiseException
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
GetLastError
HeapAlloc
HeapFree
GetProcessHeap
VirtualQuery
FreeLibrary
RtlUnwind
LoadLibraryExW
InterlockedPushEntrySList
InterlockedFlushSList
GetModuleFileNameW
GetModuleHandleExW
HeapValidate
GetSystemInfo
ExitProcess
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
GetACP
GetCurrentThread
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
OutputDebugStringA
OutputDebugStringW
WriteConsoleW
CreateThread
GetFileAttributesExW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadFile
SetFilePointerEx
HeapReAlloc
HeapSize
HeapQueryInformation
GetTimeZoneInformation
FindClose
FindFirstFileExA
FindFirstFileExW
FindNextFileA
FindNextFileW
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetEnvironmentVariableW
SetStdHandle
ReadConsoleW
CreateFileW
advapi32
RegOpenKeyExA
RegCloseKey
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
RegSetValueExA
msvcrt
strncpy
iphlpapi
GetInterfaceInfo
psapi
GetMappedFileNameW
user32
GetWindow
shell32
SHGetFolderPathW
Sections
.textbss Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 855KB - Virtual size: 856KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ