Static task
static1
Behavioral task
behavioral1
Sample
35683ac5bbcc63eb33d552878d02ff44582161d1ea1ff969b14ea326083ea780.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
35683ac5bbcc63eb33d552878d02ff44582161d1ea1ff969b14ea326083ea780.exe
Resource
win10v2004-20220812-en
General
-
Target
35683ac5bbcc63eb33d552878d02ff44582161d1ea1ff969b14ea326083ea780
-
Size
336KB
-
MD5
c6502d4dd27a434167686bfa4d183e89
-
SHA1
bddbceefe4185693ef9015d0a535eb7e034b9ec3
-
SHA256
35683ac5bbcc63eb33d552878d02ff44582161d1ea1ff969b14ea326083ea780
-
SHA512
e7958bbb238f6e484683e876d42e15ebea04ce00cedb7d377aec77eb008e4389f7e91454d9503ed5558c59c2bfbaf71530c8970e1e3a7ebe032ca8ba699c3ed9
-
SSDEEP
6144:xgITgAwvbsnWEwqVCA1jxlK11wdkWyloi/DyO:xgr/EwSCA1jXK1im/DyO
Malware Config
Signatures
Files
-
35683ac5bbcc63eb33d552878d02ff44582161d1ea1ff969b14ea326083ea780.exe windows x64
db60e0959cfe3991b2f6c66c24b00482
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
comctl32
ImageList_ReplaceIcon
ImageList_Create
ord17
kernel32
GetLastError
GetProcAddress
VirtualAlloc
CreateFileW
FlushFileBuffers
HeapSize
LCMapStringW
HeapReAlloc
HeapAlloc
SizeofResource
WriteConsoleW
SetStdHandle
OutputDebugStringW
LoadLibraryExW
HeapFree
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
SetFilePointerEx
GetConsoleMode
GetConsoleCP
LeaveCriticalSection
EnterCriticalSection
RtlUnwindEx
TlsFree
LoadLibraryW
GetModuleHandleW
LoadResource
GetModuleHandleExA
GetStringTypeW
GetSystemTimeAsFileTime
GetCommandLineA
IsDebuggerPresent
IsProcessorFeaturePresent
EncodePointer
DecodePointer
SetLastError
GetCurrentThreadId
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameA
WriteFile
GetModuleFileNameW
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
CloseHandle
user32
DestroyWindow
GetMessageA
RegisterClassExA
PostQuitMessage
TrackPopupMenu
GetSubMenu
LoadStringA
GetParent
LoadMenuA
LoadIconA
GetClientRect
SendMessageA
TranslateMessage
GetMenu
CheckMenuRadioItem
SetWindowLongA
GetWindowLongA
CreateWindowExA
GetDlgItem
EndDialog
DefWindowProcA
ShowWindow
DispatchMessageA
LoadImageA
UpdateWindow
DestroyMenu
LoadCursorA
DialogBoxParamA
CheckMenuItem
RegisterClassA
MoveWindow
advapi32
CryptAcquireContextA
CryptEncrypt
CryptCreateHash
CryptHashData
CryptDeriveKey
Sections
.text Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 244KB - Virtual size: 244KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ