Static task
static1
Behavioral task
behavioral1
Sample
537e689105b2be57e6191ba1f114479813a603bfb1f8e0618715011fdb154a8a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
537e689105b2be57e6191ba1f114479813a603bfb1f8e0618715011fdb154a8a.exe
Resource
win10v2004-20220812-en
General
-
Target
537e689105b2be57e6191ba1f114479813a603bfb1f8e0618715011fdb154a8a
-
Size
218KB
-
MD5
a1d2118d713a15256f54fd5eea8c2499
-
SHA1
36fcf0a86b28c251fd9f2ebbd02a389bc4b247da
-
SHA256
537e689105b2be57e6191ba1f114479813a603bfb1f8e0618715011fdb154a8a
-
SHA512
633c7c3d20d7b37f492df1484cde7a8dac632e0b58ec4258cdb6e8a3d81505faa347e6df0e66eca2f91d3b7c28f8f6b9140d56dd67d18b8388bc0a0fd6fd4675
-
SSDEEP
3072:BZLJlCpYQIpP18HlZRt+340EhsCptz3PNBytPRYHa/wiDBu1G:zFMIpP18pY34VPmtuHa/wik
Malware Config
Signatures
Files
-
537e689105b2be57e6191ba1f114479813a603bfb1f8e0618715011fdb154a8a.exe windows x86
ac52d79ccce22594a667800213ddaa23
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileW
CreateMutexW
CreateProcessW
CreateSemaphoreW
CreateThread
DeleteCriticalSection
DeleteFileW
DeviceIoControl
EnterCriticalSection
EraseTape
ExpandEnvironmentStringsW
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileW
FindFirstVolumeMountPointW
FindNextFileW
FindNextVolumeMountPointW
FindResourceW
FindVolumeMountPointClose
FlushFileBuffers
FormatMessageW
FreeLibrary
GetComputerNameW
GetCurrentDirectoryA
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatW
GetDiskFreeSpaceExW
GetDriveTypeW
GetEnvironmentVariableW
GetExitCodeThread
GetFileAttributesW
GetFileInformationByHandle
GetLastError
GetLocalTime
GetLocaleInfoW
GetLogicalDriveStringsW
GetModuleFileNameW
GetModuleHandleA
GetNumberFormatW
GetPrivateProfileStringW
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetSystemDirectoryW
CreateEventW
GetSystemTimeAsFileTime
GetTapeParameters
GetTapePosition
GetTapeStatus
GetTickCount
GetTimeFormatW
GetUserDefaultLCID
GetVersionExW
GetVolumeInformationW
GetVolumeNameForVolumeMountPointW
GetVolumePathNameW
GetWindowsDirectoryW
GlobalFree
HeapAlloc
HeapFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryW
LoadResource
LocalFree
LockResource
MultiByteToWideChar
PrepareTape
QueryPerformanceCounter
ReadFile
ReleaseMutex
ReleaseSemaphore
SetCurrentDirectoryW
SetEndOfFile
SetErrorMode
SetEvent
SetFileAttributesW
SetFilePointer
SetLastError
SetTapeParameters
SetTapePosition
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TerminateThread
UnhandledExceptionFilter
VerSetConditionMask
VerifyVersionInfoW
WaitForSingleObject
WriteFile
WritePrivateProfileStringW
WriteTapemark
LoadLibraryExW
CreateDirectoryW
CompareStringW
GetSystemTime
CloseHandle
user32
RegisterClassExW
LoadIconA
LoadIconW
LoadCursorA
gdi32
GetStockObject
advapi32
RegOpenKeyExA
Sections
.text4 Size: 512B - Virtual size: 100B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text3 Size: 512B - Virtual size: 100B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text1 Size: 512B - Virtual size: 100B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 167KB - Virtual size: 167KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 316B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss2 Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ