Static task
static1
Behavioral task
behavioral1
Sample
05aff988e075e57e926dd52c664670b4ed643f07a62487940a1f8068286be064.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
05aff988e075e57e926dd52c664670b4ed643f07a62487940a1f8068286be064.exe
Resource
win10v2004-20220901-en
General
-
Target
05aff988e075e57e926dd52c664670b4ed643f07a62487940a1f8068286be064
-
Size
219KB
-
MD5
6d1bc116093657c051650c1b86080fc8
-
SHA1
228934f59f67729027c08b6c817422c97fb01f68
-
SHA256
05aff988e075e57e926dd52c664670b4ed643f07a62487940a1f8068286be064
-
SHA512
7fb015c2387337a4b267227d93c8c8ee2e854f297400e217bc4cb920eba704abdf7c0c0f95211506818c0fab1c63859c74c751137d208f1d1aa0102463f99833
-
SSDEEP
3072:3EhFjOZlHQEP93XOOsDK8G87B3OwQiwDg2ICUUzM3G:3cSrHh9nsKEB3xwDr3a
Malware Config
Signatures
Files
-
05aff988e075e57e926dd52c664670b4ed643f07a62487940a1f8068286be064.exe windows x86
b745abb853ce66a09870234dc04607f1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileW
CreateMutexW
CreateProcessW
CreateSemaphoreW
CreateThread
DeleteCriticalSection
DeleteFileW
DeviceIoControl
EnterCriticalSection
EraseTape
ExpandEnvironmentStringsW
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileW
FindFirstVolumeMountPointW
FindNextFileW
FindNextVolumeMountPointW
FindResourceW
FindVolumeMountPointClose
FlushFileBuffers
FormatMessageW
FreeLibrary
GetComputerNameW
GetCurrentDirectoryA
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatW
GetDiskFreeSpaceExW
GetDriveTypeW
GetEnvironmentVariableW
GetExitCodeThread
GetFileAttributesW
GetFileInformationByHandle
GetLastError
GetLocalTime
GetLocaleInfoW
GetLogicalDriveStringsW
GetModuleFileNameW
GetModuleHandleA
GetNumberFormatW
GetPrivateProfileStringW
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetSystemDirectoryW
CreateEventW
GetSystemTimeAsFileTime
GetTapeParameters
GetTapePosition
GetTapeStatus
GetTickCount
GetTimeFormatW
GetUserDefaultLCID
GetVersionExW
GetVolumeInformationW
GetVolumeNameForVolumeMountPointW
GetVolumePathNameW
GetWindowsDirectoryW
GlobalFree
HeapAlloc
HeapFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryW
LoadResource
LocalFree
LockResource
MultiByteToWideChar
PrepareTape
QueryPerformanceCounter
ReadFile
ReleaseMutex
ReleaseSemaphore
SetCurrentDirectoryW
SetEndOfFile
SetErrorMode
SetEvent
SetFileAttributesW
SetFilePointer
SetLastError
SetTapeParameters
SetTapePosition
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TerminateThread
UnhandledExceptionFilter
VerSetConditionMask
VerifyVersionInfoW
WaitForSingleObject
WriteFile
WritePrivateProfileStringW
WriteTapemark
LoadLibraryExW
CreateDirectoryW
CompareStringW
GetSystemTime
CloseHandle
user32
LoadCursorA
UpdateWindow
LoadIconA
LoadIconW
RegisterClassExA
ShowWindow
gdi32
GetStockObject
advapi32
RegOpenKeyExA
Sections
.text4 Size: 512B - Virtual size: 100B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text3 Size: 512B - Virtual size: 100B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text1 Size: 512B - Virtual size: 100B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 167KB - Virtual size: 167KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 316B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss2 Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ