Static task
static1
Behavioral task
behavioral1
Sample
executable.3168.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
executable.3168.exe
Resource
win10v2004-20220901-en
General
-
Target
executable.3168.exe
-
Size
195KB
-
MD5
fde7371d62944e24c80d131aa5698d52
-
SHA1
9852ffff87a71f2a0f97a52b920362b176635d51
-
SHA256
cf3e8a9cf77a352b3a9cb90ca9b02be80aa6ee97275ee2dd107ef5b3186ba505
-
SHA512
7dde77d52627dcdf06e94be8b8cf66d4d35408e725e47a0d941e65a1db1a56a1f7e1710b99bb357f03616a90f5e65ddeb4f88d10fc5d084766bd05bb5eb5ef73
-
SSDEEP
1536:xqrvWqGnuQddRG0zn6WfqAX3ezmNbRn3PnGRPxwrImpxQHzGkYxTbW4ebxBPVeiM:xeynRGBJmNmPxwrIUKgTCZ
Malware Config
Signatures
Files
-
executable.3168.exe.exe windows x86
43113498b8b20f2c980e4c01b8a5839d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemWow64DirectoryW
CreateFileW
GetStdHandle
GetLastError
GetCurrentDirectoryW
GetProcAddress
GetDiskFreeSpaceW
SizeofResource
LockResource
DeviceIoControl
CloseHandle
DeleteFileW
GetSystemTime
ExpandEnvironmentStringsW
LoadLibraryW
GetSystemDirectoryW
WriteFile
GetModuleHandleW
GetComputerNameW
GetCurrentProcess
SetConsoleTextAttribute
LoadResource
FindResourceW
GetConsoleScreenBufferInfo
GetFullPathNameW
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
GetCommandLineA
HeapSetInformation
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DecodePointer
EncodePointer
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
ExitProcess
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
GetConsoleCP
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
Sleep
MultiByteToWideChar
RtlUnwind
WriteConsoleW
SetStdHandle
LCMapStringW
GetStringTypeW
HeapReAlloc
IsProcessorFeaturePresent
FlushFileBuffers
ReadFile
HeapSize
advapi32
RegCloseKey
AdjustTokenPrivileges
CheckTokenMembership
RegOpenKeyExW
FreeSid
AllocateAndInitializeSid
LookupPrivilegeValueW
RegCreateKeyExA
OpenProcessToken
RegSetValueExW
shlwapi
SHDeleteKeyW
Sections
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 131KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ