Static task
static1
Behavioral task
behavioral1
Sample
d013322e39a0b7c3e36d942b1adf628b7c373dd176b8f92023be8dbfe73e9ea9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d013322e39a0b7c3e36d942b1adf628b7c373dd176b8f92023be8dbfe73e9ea9.exe
Resource
win10v2004-20220901-en
General
-
Target
d013322e39a0b7c3e36d942b1adf628b7c373dd176b8f92023be8dbfe73e9ea9
-
Size
536KB
-
MD5
7a11f58d6864c498deed215a074dbe90
-
SHA1
bbf0cfa60b32185ae1fd62e42db127c0140df055
-
SHA256
d013322e39a0b7c3e36d942b1adf628b7c373dd176b8f92023be8dbfe73e9ea9
-
SHA512
9e5ecafb69da83e679e9a9669eed8cbbbdd759d693b73f5c2fb9c6848dfeea4b804ee5437ff58342c9eaf43945079eef4ff3ea1d8429b599e8b2167c87d0f87b
-
SSDEEP
12288:D/R7c9d5vtmOYrY1b9nhLTLXi1QVTTvbcpv6EvOI:rROFtwQ7XUkTTv4pyd
Malware Config
Signatures
Files
-
d013322e39a0b7c3e36d942b1adf628b7c373dd176b8f92023be8dbfe73e9ea9.exe windows x86
3c280c039a78872082b3587c4fa4beab
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetTextFaceW
GetDeviceCaps
kernel32
ExitProcess
OpenThread
TlsGetValue
DeleteFiber
EncodeSystemPointer
GetFileAttributesA
WriteProfileSectionW
UnhandledExceptionFilter
OpenEventW
SetErrorMode
RemoveDirectoryA
PeekNamedPipe
SetFileShortNameW
GetVolumePathNameW
GetNamedPipeHandleStateW
ScrollConsoleScreenBufferA
UnlockFileEx
GetLogicalDrives
FreeEnvironmentStringsW
GetNamedPipeHandleStateA
LockFile
lstrcmpA
FreeConsole
GetGeoInfoA
Sleep
VirtualQueryEx
HeapAlloc
GetCommandLineA
GetVersionExA
OutputDebugStringA
DeleteCriticalSection
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
HeapDestroy
HeapCreate
VirtualFree
HeapFree
VirtualAlloc
HeapReAlloc
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
GetProcAddress
GetModuleHandleA
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetLastError
GetCurrentThreadId
GetCurrentThread
SetUnhandledExceptionFilter
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
GetConsoleCP
GetConsoleMode
InitializeCriticalSection
GetModuleHandleW
RtlUnwind
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
TerminateProcess
GetCurrentProcess
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LoadLibraryA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
VirtualProtect
GetSystemInfo
VirtualQuery
GetTimeZoneInformation
FlushFileBuffers
CreateFileA
CloseHandle
GetLocaleInfoW
ReadFile
CompareStringA
CompareStringW
SetEnvironmentVariableA
user32
MessageBoxA
oleaut32
VarCyFromI1
pdh
PdhGetLogFileSize
PdhOpenQueryA
Sections
.text Size: 180KB - Virtual size: 179KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.crt Size: 80KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
B>A1fE Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CONST Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE