Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
271KB
-
MD5
fed15979d927202175a67f39a2de5b73
-
SHA1
541da8999a0f81a12122344eeafe3b030a09a4ab
-
SHA256
61006792b65fc074f90f6cc6b2696e04d52d679b4821d3684adccf106cac81ba
-
SHA512
5e1488cdb4ceda3c525a139218eca392e71389c6e63d0b92d7571894a467165a36dfb640377c5d978bf8bf1c1b8f846a524e5dc866bb1bca2ad0c4f96550c653
-
SSDEEP
6144:4P41s0DaLlZhuKYEIWgURuzbgwup/pwVfUPk:4Pqsv5ZEEIcunnc/c
Malware Config
Signatures
Files
-
file.exe.exe windows x86
88ae0b1b86ca75a326fa794c920a20b9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AllocConsole
GetConsoleAliasExesLengthA
SetConsoleTextAttribute
GetConsoleAliasA
WaitNamedPipeA
SetComputerNameW
GetSystemDefaultLCID
EnumCalendarInfoExW
GetPrivateProfileStringW
SetCommTimeouts
EnumResourceTypesA
GetVolumePathNameW
FindResourceExA
SetFileShortNameW
GetVolumeInformationA
LoadLibraryW
SetVolumeMountPointA
GetSystemTimeAdjustment
GetVersionExW
GetConsoleAliasW
GetFileAttributesW
GetGeoInfoA
GetTimeZoneInformation
GetBinaryTypeW
WritePrivateProfileStringW
GetShortPathNameA
GetProfileIntA
GetLastError
GetProcAddress
GetLongPathNameA
VirtualAlloc
IsBadHugeWritePtr
WriteConsoleOutputCharacterW
SearchPathW
OpenWaitableTimerA
LoadLibraryA
WriteConsoleA
InterlockedExchangeAdd
LocalAlloc
SetCalendarInfoW
GetFileType
AddVectoredExceptionHandler
CreateEventW
BeginUpdateResourceA
AddAtomA
FoldStringW
EnumResourceTypesW
GlobalWire
GetModuleFileNameA
FindNextFileA
GetModuleHandleA
FindFirstChangeNotificationA
CreateMutexA
FindNextFileW
GetConsoleTitleW
VirtualProtect
GetFileAttributesExW
PeekConsoleInputA
GetCPInfoExA
ReadConsoleInputW
DeleteFileW
SetFileAttributesW
DeleteFileA
GlobalGetAtomNameA
FindFirstChangeNotificationW
GetComputerNameA
FillConsoleOutputCharacterA
ResetEvent
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
GetStartupInfoA
DeleteCriticalSection
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RaiseException
ReadFile
HeapAlloc
HeapReAlloc
InitializeCriticalSectionAndSpinCount
RtlUnwind
SetStdHandle
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
FlushFileBuffers
HeapSize
CreateFileA
CloseHandle
gdi32
GetCharWidthFloatW
advapi32
DeregisterEventSource
CloseEventLog
ole32
OleQueryLinkFromData
Sections
.text Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 82KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ