Static task
static1
Behavioral task
behavioral1
Sample
80917EA4973991824E65F2F20AC1ECEA5FF98A926F232.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
80917EA4973991824E65F2F20AC1ECEA5FF98A926F232.exe
Resource
win10v2004-20220812-en
General
-
Target
80917EA4973991824E65F2F20AC1ECEA5FF98A926F232.exe
-
Size
316KB
-
MD5
973567b5fe2edd9f6e0e8da3faf84ec6
-
SHA1
9fe580182827a16c21cb30e07d31b51262d3a8c9
-
SHA256
80917ea4973991824e65f2f20ac1ecea5ff98a926f23234919079040f6c6af28
-
SHA512
6d685bb1743ae84da1d744caad40e481b1193e1ae62d1bb2425bb4c232aa030d4dc4ff6a7dec65e85f81506129c1112d2a0c9d41df654a14720683173e467df8
-
SSDEEP
6144:WTfWIscFWDHymWlHGyuDdhbZ6MU9kERRRGCH7:WT+skS1lHGyuD7Z6MKkwP
Malware Config
Signatures
Files
-
80917EA4973991824E65F2F20AC1ECEA5FF98A926F232.exe.exe windows x86
027f8148b5a9a5b0d04d7197ae184994
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProfileSectionA
VerifyVersionInfoA
QueryDosDeviceA
OpenThread
GetProcessPriorityBoost
GlobalGetAtomNameW
GetComputerNameExA
FindResourceW
GetComputerNameExW
GetModuleHandleW
GetSystemDirectoryW
BuildCommDCBAndTimeoutsW
GetProcAddress
LoadLibraryA
GetModuleHandleA
VirtualAlloc
GetMailslotInfo
_lread
GetDiskFreeSpaceExA
WriteConsoleW
GetCommandLineW
GetLastError
GetCommandLineA
InterlockedIncrement
CreateJobObjectW
InitializeCriticalSection
GetConsoleFontSize
FindNextVolumeW
CreateIoCompletionPort
GetThreadSelectorEntry
LoadLibraryW
GetConsoleAliasesLengthW
WriteProfileSectionA
AddAtomW
InterlockedDecrement
FoldStringA
GetProfileSectionW
GetDefaultCommConfigA
GetConsoleAliasesLengthA
GetLogicalDrives
TerminateProcess
SetHandleInformation
SetCriticalSectionSpinCount
GetComputerNameA
EnumSystemLocalesA
FreeLibrary
OpenMutexW
FileTimeToLocalFileTime
SearchPathW
FindNextFileA
WaitForSingleObject
CreateMutexA
FindResourceA
FormatMessageW
InterlockedCompareExchange
EnumDateFormatsA
GetConsoleScreenBufferInfo
GlobalAlloc
EnumDateFormatsExW
ActivateActCtx
GetFileInformationByHandle
GetFileAttributesA
GetSystemWindowsDirectoryA
GetAtomNameA
ReadConsoleInputW
EnumDateFormatsW
GetPrivateProfileStructA
_hwrite
GetConsoleAliasA
GetFullPathNameA
DebugSetProcessKillOnExit
SetCurrentDirectoryA
SetCalendarInfoA
EnumCalendarInfoExA
CreateFileA
FlushConsoleInputBuffer
ReadConsoleOutputCharacterW
FindNextFileW
CopyFileExW
lstrcpyW
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
MoveFileA
DeleteFileA
RaiseException
GetStartupInfoW
HeapValidate
IsBadReadPtr
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
GetCurrentProcess
IsDebuggerPresent
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
Sleep
ExitProcess
GetModuleFileNameA
WriteFile
GetStdHandle
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
HeapFree
VirtualFree
HeapAlloc
HeapSize
HeapReAlloc
RtlUnwind
InitializeCriticalSectionAndSpinCount
DebugBreak
OutputDebugStringA
OutputDebugStringW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadFile
SetFilePointer
CloseHandle
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
user32
LoadMenuA
CharUpperW
GetMenuInfo
gdi32
GetBoundsRect
GetCharWidth32A
SelectObject
GetCharWidthW
Sections
.text Size: 195KB - Virtual size: 195KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 80KB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ