Static task
static1
Behavioral task
behavioral1
Sample
4452777327919a3c8b2b91ee9bf74fcbb2520cd61c4aae41928e1d1b7d653a22.exe
Resource
win10-20220812-en
General
-
Target
4452777327919a3c8b2b91ee9bf74fcbb2520cd61c4aae41928e1d1b7d653a22
-
Size
146KB
-
MD5
d6ced114a7dff7780731d6b51d7243dd
-
SHA1
9439c9cf57c785f6633f4f9e655c11b89c7a5511
-
SHA256
4452777327919a3c8b2b91ee9bf74fcbb2520cd61c4aae41928e1d1b7d653a22
-
SHA512
5bcd609bdb2eae9f730bf12e39785c2de421c3a23c1a14b2479a4ba9469dac5c38b9375a755832164d3ccd7ccd05d4298f0d8f5853b881729fd11b8d99dbd93d
-
SSDEEP
1536:Jm6CiDvDt397eSTNjRegWtxPgV25DzrfDKHuW038E+M7MFkYgb0Dsfgjq7UlZZMa:IhiWSWtp/rLKn034M8kYtRcUyqg4kqO
Malware Config
Signatures
Files
-
4452777327919a3c8b2b91ee9bf74fcbb2520cd61c4aae41928e1d1b7d653a22.exe windows x86
2d5ec24fb9d2ee4cf8208f9e16125d4f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
InterlockedPushEntrySList
GetConsoleAliasesW
ReadFile
ReadConsoleW
GetVolumeInformationA
GetComputerNameA
LocalFree
InterlockedDecrement
SetSystemTimeAdjustment
SetLocaleInfoA
FindNextVolumeA
FindCloseChangeNotification
CopyFileExA
MoveFileWithProgressW
VerifyVersionInfoW
LocalSize
FileTimeToDosDateTime
DebugBreak
GlobalGetAtomNameW
IsBadWritePtr
FindResourceA
GetComputerNameExW
GetProcAddress
GetStringTypeW
GetFileTime
GetConsoleAliasesLengthW
GetVolumeNameForVolumeMountPointA
DeleteVolumeMountPointA
GetCPInfo
PostQueuedCompletionStatus
MoveFileWithProgressA
CopyFileA
lstrcpynW
WriteConsoleW
GetBinaryTypeA
WriteConsoleOutputW
GetCommandLineA
InterlockedIncrement
CreateActCtxW
FormatMessageA
GetModuleHandleW
GetModuleHandleA
LeaveCriticalSection
GetStringTypeExA
OpenMutexW
FindResourceW
RtlCaptureContext
InterlockedExchange
InitializeCriticalSectionAndSpinCount
DeleteFiber
InterlockedExchangeAdd
EnumDateFormatsA
GetPrivateProfileStructA
GetNamedPipeHandleStateW
RegisterWaitForSingleObject
LocalAlloc
QueryMemoryResourceNotification
SetLastError
GetProcessPriorityBoost
GetMailslotInfo
HeapWalk
SetFilePointer
SetConsoleMode
RaiseException
RtlUnwind
GetLastError
MoveFileA
DeleteFileA
GetStartupInfoA
HeapAlloc
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
EnterCriticalSection
VirtualAlloc
HeapReAlloc
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
LCMapStringA
LCMapStringW
user32
CharUpperBuffW
winhttp
WinHttpCreateUrl
Sections
.text Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 71KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ