Static task
static1
Behavioral task
behavioral1
Sample
49e96a8399aff0814556d163d477d334dd6119a81a3818b3eb11ac421969c52c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
49e96a8399aff0814556d163d477d334dd6119a81a3818b3eb11ac421969c52c.exe
Resource
win10v2004-20220901-en
General
-
Target
49e96a8399aff0814556d163d477d334dd6119a81a3818b3eb11ac421969c52c
-
Size
584KB
-
MD5
6701427e8bd3d6e6628278cc8c6232b0
-
SHA1
e5a23a76c45e25a364cec6c4debb13e8a5af9343
-
SHA256
49e96a8399aff0814556d163d477d334dd6119a81a3818b3eb11ac421969c52c
-
SHA512
a43dd2f3e7897231c975361c329f93e43d810f24d6c92624cf82a92fd057ddc689d0bd3bf5c8717d49577b1f486d158b915c0882dfa94d8b93fb2ae1b5a35d1f
-
SSDEEP
6144:XLddUgXGJjijm2+9dTQ+/CJcsr8bOmcIHH+jzTyqoB7AXwB2J0HUQFPSyklyU6jl:brQJPQJR+Hy/yqGMqH3lSyBU6ISsPO
Malware Config
Signatures
Files
-
49e96a8399aff0814556d163d477d334dd6119a81a3818b3eb11ac421969c52c.exe windows x86
8fee74aad97ca6d4da74fb5bd0aa4dce
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetConsoleCursorPosition
GetConsoleScreenBufferInfo
GetFileType
GetStdHandle
SetPriorityClass
OpenProcess
GetCurrentProcessId
FindClose
FindFirstFileA
FormatMessageA
LoadLibraryA
GetThreadLocale
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleW
Sleep
GetProcAddress
ExitProcess
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileInformationByHandle
PeekNamedPipe
GetLastError
GetDriveTypeA
GetTimeZoneInformation
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
GetCommandLineA
HeapReAlloc
GetModuleHandleA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
SetHandleCount
GetStartupInfoA
DeleteCriticalSection
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
CloseHandle
MultiByteToWideChar
ReadFile
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetModuleFileNameA
InitializeCriticalSectionAndSpinCount
SetFilePointer
SetStdHandle
GetFullPathNameA
GetCurrentDirectoryA
VirtualFree
VirtualAlloc
HeapCreate
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
CreateFileA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
HeapSize
GetLocaleInfoA
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetStringTypeA
GetStringTypeW
SetEndOfFile
GetProcessHeap
Sections
.text Size: 360KB - Virtual size: 360KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 152KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 220KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ