Static task
static1
Behavioral task
behavioral1
Sample
malware_smoke_1680773518.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
malware_smoke_1680773518.exe
Resource
win10v2004-20220901-en
General
-
Target
malware_smoke_1680773518
-
Size
219KB
-
MD5
97d3c9bb79ba5ae1d6b985ba6810fb59
-
SHA1
a252dea827147a68533a2fdd202600433dc82932
-
SHA256
d92e07147918cabe5c4f01987a5e68d921ffab69f96c16e87048eb5749bc827a
-
SHA512
984bad4541d38451ac48c7893c0befe83aba43cd01d6cdb1a1a3196d4d1d9e5b21819cbc49e04e4ddcceb02586b8d2c302dc432b505c32ea5204b1c03966801c
-
SSDEEP
3072:wZ3FwndtTRlF0DBQMjZuTgCm+I9kwM6/AxDJan/MS1HmsxkgaBChcpZa9uD6VdyW:Fl2QeZfCmLaS/ADaxzigafwVf
Malware Config
Signatures
Files
-
malware_smoke_1680773518.exe windows x86
55a2b5a2ae91031aec8b458899df3011
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedDecrement
GetLocaleInfoA
InterlockedIncrement
_lwrite
GetCommTimeouts
GetSystemDirectoryA
CreateEventW
WriteConsoleW
VerifyVersionInfoA
BuildCommDCBW
AddConsoleAliasW
HeapLock
PeekConsoleInputW
EnumDateFormatsW
ResetEvent
UnregisterWait
LoadLibraryA
WaitNamedPipeW
FindResourceExA
DeleteTimerQueue
GetFirmwareEnvironmentVariableW
GetModuleFileNameW
BeginUpdateResourceW
GetConsoleAliasExesLengthW
EnumTimeFormatsW
CopyFileA
ReadConsoleOutputCharacterA
UnhandledExceptionFilter
LocalAlloc
GetProcAddress
GetUserDefaultLangID
GetSystemWindowsDirectoryW
FindFirstChangeNotificationA
EndUpdateResourceW
WritePrivateProfileStringA
EnumResourceNamesA
LocalReAlloc
GlobalReAlloc
AreFileApisANSI
GetCurrentDirectoryA
GetConsoleAliasesLengthW
GetAtomNameA
SetFileAttributesA
SetConsoleTitleW
VerSetConditionMask
GetCurrentProcess
GetProcessWorkingSetSize
GetLongPathNameW
GetThreadLocale
GetSystemDefaultLCID
GetCurrentProcessId
GetLastError
SetComputerNameExA
FindFirstFileExA
BuildCommDCBAndTimeoutsW
EnterCriticalSection
EnumCalendarInfoExW
GetDiskFreeSpaceA
GetConsoleAliasExesA
GlobalMemoryStatus
WriteConsoleOutputCharacterA
EnumSystemLocalesA
GetComputerNameA
VerifyVersionInfoW
CreateFileW
GetConsoleAliasesLengthA
LoadLibraryW
GetStringTypeW
LCMapStringW
HeapReAlloc
HeapFree
GetCommandLineW
HeapSetInformation
GetStartupInfoW
IsProcessorFeaturePresent
EncodePointer
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
SetUnhandledExceptionFilter
IsDebuggerPresent
DecodePointer
TerminateProcess
SetFilePointer
HeapAlloc
HeapCreate
ReadFile
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
CloseHandle
GetModuleHandleW
ExitProcess
FreeEnvironmentStringsW
GetEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
Sleep
RtlUnwind
SetStdHandle
FlushFileBuffers
MultiByteToWideChar
RaiseException
HeapSize
user32
ClientToScreen
gdi32
GetTextExtentExPointW
winhttp
WinHttpReadData
WinHttpCloseHandle
Sections
.text Size: 121KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.toj Size: 512B - Virtual size: 1B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.wamuzu Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.zexokir Size: 1024B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sapel Size: 512B - Virtual size: 23B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xuje Size: 1024B - Virtual size: 963B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 81KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ