Static task
static1
Behavioral task
behavioral1
Sample
964dd71eeb91e494645dcc80dab663ba5ba68bac3273d9b5fe86b3cd31cce7af.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
964dd71eeb91e494645dcc80dab663ba5ba68bac3273d9b5fe86b3cd31cce7af.exe
Resource
win10v2004-20220812-en
General
-
Target
964dd71eeb91e494645dcc80dab663ba5ba68bac3273d9b5fe86b3cd31cce7af
-
Size
1.9MB
-
MD5
60a3930a8f83f547a9ff374bfd394e87
-
SHA1
0a39d1ff85a09f4f30c53f7781054a0c077a4047
-
SHA256
964dd71eeb91e494645dcc80dab663ba5ba68bac3273d9b5fe86b3cd31cce7af
-
SHA512
2ebd8c8270bb53f5dd6760ea3c1a549437d0f47f56850e564690ea1e1ce905567e5991fe48d17b27d447516e2f737c1bbbfae00a6e924c1993410b03fe171db5
-
SSDEEP
24576:ODyTFtjtDyTFtjADyTFtjZDyTFtjaDyTFtj:bt+tNtqtDt
Malware Config
Signatures
Files
-
964dd71eeb91e494645dcc80dab663ba5ba68bac3273d9b5fe86b3cd31cce7af.exe windows x86
8746adb12fe4ae166fda85871d6a9edd
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineW
GetProcAddress
LoadLibraryExW
ExitProcess
OpenEventA
WaitForSingleObject
WinExec
VirtualAllocEx
SleepEx
LoadLibraryA
GetModuleFileNameA
GetModuleHandleA
CreateFileA
SetDllDirectoryW
GetTapeStatus
EnumUILanguagesW
SetLocalTime
OpenJobObjectW
Heap32ListNext
DeleteVolumeMountPointW
GetComputerNameA
CallNamedPipeW
GetMailslotInfo
FreeEnvironmentStringsA
GetProcessTimes
GetPrivateProfileIntW
RequestWakeupLatency
FindResourceA
SetConsoleInputExeNameA
MoveFileExW
SetThreadContext
SetSystemTimeAdjustment
SetConsoleFont
GetGeoInfoW
IsSystemResumeAutomatic
UnmapViewOfFile
VerifyVersionInfoW
GetBinaryTypeW
IsValidLanguageGroup
SetConsoleInputExeNameW
IsValidCodePage
CompareFileTime
VirtualUnlock
GetLogicalDriveStringsW
LocalShrink
RequestDeviceWakeup
MapViewOfFileEx
GetNamedPipeInfo
FindResourceExW
GetNumaHighestNodeNumber
PostQueuedCompletionStatus
TerminateProcess
DnsHostnameToComputerNameA
HeapCompact
GetProcessPriorityBoost
HeapUnlock
LZCloseFile
GetUserDefaultLangID
ExpandEnvironmentStringsA
CloseProfileUserMapping
GetCommandLineA
SetComputerNameA
GetConsoleSelectionInfo
FindFirstVolumeW
GetWriteWatch
SetConsoleKeyShortcuts
BuildCommDCBAndTimeoutsW
SetConsoleTitleW
BeginUpdateResourceA
SignalObjectAndWait
GetShortPathNameW
GetEnvironmentStringsA
FatalAppExitA
ReadConsoleInputA
FindNextVolumeMountPointA
DeviceIoControl
GetConsoleTitleW
EnumCalendarInfoA
SetDefaultCommConfigW
VirtualAlloc
GetVDMCurrentDirectories
GetCurrentDirectoryW
AreFileApisANSI
SetFileShortNameA
GetVolumePathNamesForVolumeNameA
SetVolumeMountPointW
GetCommTimeouts
GetLocaleInfoA
QueryDosDeviceA
CreateSocketHandle
LockFile
Process32NextW
GetProfileStringA
GetVolumePathNameA
GetSystemTimeAsFileTime
InitializeCriticalSection
EnumTimeFormatsW
GetThreadContext
GetAtomNameA
EnumSystemLocalesW
RaiseException
LZOpenFileW
SetComputerNameExW
AttachConsole
UTUnRegister
QueryDosDeviceW
WriteConsoleOutputAttribute
GetProfileIntW
LZStart
FileTimeToLocalFileTime
AddAtomA
FindVolumeClose
GetDevicePowerState
GetConsoleOutputCP
InvalidateConsoleDIBits
GetDllDirectoryW
RemoveLocalAlternateComputerNameA
CreateProcessW
PeekConsoleInputA
GlobalGetAtomNameA
GlobalSize
ReadConsoleOutputW
FormatMessageW
CreateDirectoryExA
WriteProcessMemory
FindFirstChangeNotificationA
IsDBCSLeadByte
SetConsoleCtrlHandler
GetFullPathNameW
IsBadStringPtrA
SystemTimeToFileTime
GetCalendarInfoA
SetConsoleCP
GetCurrentThreadId
SuspendThread
BasepCheckWinSaferRestrictions
Thread32First
DebugActiveProcess
WaitNamedPipeW
GetDiskFreeSpaceA
GetConsoleCommandHistoryLengthW
GetBinaryTypeA
MapViewOfFile
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE