Static task
static1
Behavioral task
behavioral1
Sample
be6b601969873cfc7be4b9169341e12b791df79cb178f3dae79ec9c3c9157d1a.exe
Resource
win10v2004-20220812-en
General
-
Target
be6b601969873cfc7be4b9169341e12b791df79cb178f3dae79ec9c3c9157d1a
-
Size
734KB
-
MD5
e78bd07af8e08b0c950a424fdbdc3d18
-
SHA1
075777150c2dfdfd98d28c4200153f0ba9b761d9
-
SHA256
be6b601969873cfc7be4b9169341e12b791df79cb178f3dae79ec9c3c9157d1a
-
SHA512
b47e040ce87c6923dfb1adafe2e3284107d88d15bb8f065567377990f71c10a33bfc211347a7dc2bbd0a0ea13e4b7c6169a5134f7108951b8ca9fa47a3589cf2
-
SSDEEP
12288:ejVvCtUMEEKHGA5T0w/raZ065ZKt7LCHO7WIuIPNU+jUYh+h:ejiUMEBGKow/raZ0JqHO7WUNxYYs
Malware Config
Signatures
Files
-
be6b601969873cfc7be4b9169341e12b791df79cb178f3dae79ec9c3c9157d1a.exe windows x86
47f3841b8380a704a9ff258e0444ec1d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVolumeInformationA
GetComputerNameW
LocalFree
InterlockedDecrement
GetSystemTimeAdjustment
SetLocaleInfoA
FindNextVolumeW
FindCloseChangeNotification
EnumSystemCodePagesW
FindNextFileA
CopyFileExA
MoveFileWithProgressA
VerifyVersionInfoW
LocalSize
DosDateTimeToFileTime
DebugBreak
GlobalGetAtomNameA
MapViewOfFileEx
GetWindowsDirectoryA
DeleteFileA
lstrlenW
IsBadReadPtr
FindResourceW
GetComputerNameExW
GetProcAddress
GetStringTypeW
GetFileTime
GetConsoleAliasesLengthA
DeleteVolumeMountPointA
GetPrivateProfileStructA
GetOEMCP
CreateIoCompletionPort
ReadConsoleA
lstrcpynW
WriteConsoleA
GetBinaryTypeA
WriteConsoleOutputA
GetCommandLineA
CreateActCtxW
FormatMessageW
GetModuleHandleA
EnterCriticalSection
GetComputerNameA
GetStringTypeExW
OpenMutexA
LocalFlags
FindResourceA
RtlCaptureContext
InterlockedCompareExchange
InitializeCriticalSectionAndSpinCount
GetPrivateProfileStructW
DeleteFiber
InterlockedExchange
EnumDateFormatsW
EnumCalendarInfoA
GetConsoleAliasExesLengthW
OpenSemaphoreA
InterlockedIncrement
GetNamedPipeHandleStateW
UnregisterWait
LocalAlloc
GetLogicalDriveStringsA
SetLastError
CopyFileW
LoadLibraryA
WideCharToMultiByte
MultiByteToWideChar
Sleep
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
RtlUnwind
RaiseException
GetLastError
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
MoveFileA
GetStartupInfoW
LCMapStringA
LCMapStringW
GetCPInfo
HeapAlloc
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
IsValidCodePage
GetLocaleInfoA
GetStringTypeA
HeapSize
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
SetFilePointer
GetConsoleCP
GetConsoleMode
GetLocaleInfoW
SetStdHandle
GetConsoleOutputCP
WriteConsoleW
CreateFileA
CloseHandle
FlushFileBuffers
user32
CharUpperBuffA
advapi32
RevertToSelf
Sections
.text Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 591KB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ