Static task
static1
Behavioral task
behavioral1
Sample
53152589aa4c4d54fd128829dbe29343bc474b09.exe
Resource
win10v2004-20220812-en
General
-
Target
53152589aa4c4d54fd128829dbe29343bc474b09
-
Size
276KB
-
MD5
ed4bb4c44ebd36644a49d53cc3f2cfef
-
SHA1
53152589aa4c4d54fd128829dbe29343bc474b09
-
SHA256
0b60e698ec5da986b351328b290acb8362101814410b63ab7f991bc63c326dd8
-
SHA512
21265cec6e5c4e6ebc3a5e0390e2a5554291ed3687566ea0bf1fbeefb11c7e02a11dd158bfff3fd943bd95086ebcf0d581011c247b209ad8c2ca4f5fc93bf41d
-
SSDEEP
6144:Dyi3YsEOJXDiC2DOcTg/edargYzVoaVBBAC:OieOJX+CIOtWdkTzVN6C
Malware Config
Signatures
Files
-
53152589aa4c4d54fd128829dbe29343bc474b09.exe windows x86
f95fc721f840e4fa828383c1c37740ae
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumDateFormatsA
FindNextFileW
CopyFileExA
ReadConsoleOutputCharacterA
FlushConsoleInputBuffer
UnlockFile
GetProfileSectionW
VerifyVersionInfoW
QueryDosDeviceW
OpenThread
SetProcessPriorityBoost
GlobalGetAtomNameW
lstrlenW
FindNextVolumeMountPointW
GlobalDeleteAtom
WriteConsoleInputW
WriteConsoleInputA
FindResourceW
GetComputerNameExW
OpenEventW
CallNamedPipeA
GetModuleHandleW
GetSystemDirectoryA
GetCurrentDirectoryA
BuildCommDCBAndTimeoutsA
GetProcAddress
GetModuleHandleA
VirtualAlloc
SetMailslotInfo
GetDiskFreeSpaceExW
GlobalGetAtomNameA
WriteConsoleW
GetCommandLineA
VerifyVersionInfoA
CreateJobObjectW
InitializeCriticalSection
GetNumberOfConsoleMouseButtons
FindNextVolumeW
GetOverlappedResult
GetThreadSelectorEntry
LoadLibraryW
GetSystemDefaultLangID
WriteProfileSectionW
AddAtomW
InterlockedIncrement
HeapSize
_hread
GetStartupInfoA
CreateMailslotA
WideCharToMultiByte
GetSystemWow64DirectoryW
GetConsoleAliasExesLengthA
WaitForDebugEvent
GetTickCount
LoadLibraryA
GetLastError
GetProfileSectionA
GetDefaultCommConfigW
GetConsoleAliasesLengthA
lstrcpyA
GetComputerNameW
EnumSystemLocalesA
DeleteCriticalSection
FileTimeToLocalFileTime
SearchPathW
GetComputerNameExA
LockFile
CreateMutexW
FormatMessageW
InterlockedExchangeAdd
GetConsoleFontSize
LocalAlloc
EnumCalendarInfoExW
GetFileSize
HeapAlloc
GetFileAttributesA
GetSystemWindowsDirectoryW
GetAtomNameW
ReadConsoleInputW
GetPrivateProfileStructA
_hwrite
GetConsoleAliasA
SetWaitableTimer
GetFullPathNameW
DebugSetProcessKillOnExit
SetCurrentDirectoryW
SetCalendarInfoW
CreateFileA
CloseHandle
UnhandledExceptionFilter
SetUnhandledExceptionFilter
DeleteFileA
RaiseException
HeapValidate
IsBadReadPtr
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
InterlockedDecrement
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
Sleep
ExitProcess
GetModuleFileNameA
WriteFile
GetStdHandle
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
HeapFree
VirtualFree
HeapReAlloc
RtlUnwind
InitializeCriticalSectionAndSpinCount
DebugBreak
OutputDebugStringA
OutputDebugStringW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetFilePointer
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
user32
GetMenuInfo
LoadMenuW
CharUpperW
GetListBoxInfo
GetCursorInfo
Sections
.text Size: 147KB - Virtual size: 147KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 66KB - Virtual size: 40.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ