Static task
static1
Behavioral task
behavioral1
Sample
26df17bd6c993ca1eb1646098c3b7a4384bb11bfe3e732e29a6312adaf605043.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
26df17bd6c993ca1eb1646098c3b7a4384bb11bfe3e732e29a6312adaf605043.exe
Resource
win10v2004-20220901-en
General
-
Target
26df17bd6c993ca1eb1646098c3b7a4384bb11bfe3e732e29a6312adaf605043
-
Size
581KB
-
MD5
7a331f6ddd34655784934e3bfbf64500
-
SHA1
c151344050762080a5282509644522e42ec9caea
-
SHA256
26df17bd6c993ca1eb1646098c3b7a4384bb11bfe3e732e29a6312adaf605043
-
SHA512
56a09d5a4c2809bd77a5e877b542d48165a715ffe0611adeaa1932786ea5df0b9dd3b5890689b101438865ecdfd8089e4eed09efd158b6dd84404cae9085ca10
-
SSDEEP
6144:gLddUgXGJjijm2+9dTQ+/CJcsr8bOmcIHH+jzTyqoB7AXwB2J0HUQFPSyklyU6j1:orQJPQJR+Hy/yqGMqH3lSyBU6VPaGh
Malware Config
Signatures
Files
-
26df17bd6c993ca1eb1646098c3b7a4384bb11bfe3e732e29a6312adaf605043.exe windows x86
8fee74aad97ca6d4da74fb5bd0aa4dce
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetConsoleCursorPosition
GetConsoleScreenBufferInfo
GetFileType
GetStdHandle
SetPriorityClass
OpenProcess
GetCurrentProcessId
FindClose
FindFirstFileA
FormatMessageA
LoadLibraryA
GetThreadLocale
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleW
Sleep
GetProcAddress
ExitProcess
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileInformationByHandle
PeekNamedPipe
GetLastError
GetDriveTypeA
GetTimeZoneInformation
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
GetCommandLineA
HeapReAlloc
GetModuleHandleA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
SetHandleCount
GetStartupInfoA
DeleteCriticalSection
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
CloseHandle
MultiByteToWideChar
ReadFile
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetModuleFileNameA
InitializeCriticalSectionAndSpinCount
SetFilePointer
SetStdHandle
GetFullPathNameA
GetCurrentDirectoryA
VirtualFree
VirtualAlloc
HeapCreate
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
CreateFileA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
HeapSize
GetLocaleInfoA
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetStringTypeA
GetStringTypeW
SetEndOfFile
GetProcessHeap
Sections
.text Size: 360KB - Virtual size: 360KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 152KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 220KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ