Static task
static1
Behavioral task
behavioral1
Sample
f614d5881091cffb689b59cf2d751284119bc43cc6ee95dfc446ffb3dab2cf30.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f614d5881091cffb689b59cf2d751284119bc43cc6ee95dfc446ffb3dab2cf30.exe
Resource
win10v2004-20220812-en
General
-
Target
f614d5881091cffb689b59cf2d751284119bc43cc6ee95dfc446ffb3dab2cf30
-
Size
218KB
-
MD5
0733b37e989e4a461b4163607348ff5b
-
SHA1
b814486145acffc81c6d4b899a3ab19dc56bbaab
-
SHA256
f614d5881091cffb689b59cf2d751284119bc43cc6ee95dfc446ffb3dab2cf30
-
SHA512
45b744477cc737e5b90daa16d6b879d70187b3101ac5004e7d3111c7e7308e8fd271f599d6abcc1e2c08114e455cc1ff956e9aa76a8c3ef3c44644ba802670d1
-
SSDEEP
3072:BZLJlCpYQIpP18HlZRt+340EhsCptz3PNBytPRYHa/wiDButG:zFMIpP18pY34VPmtuHa/wiM
Malware Config
Signatures
Files
-
f614d5881091cffb689b59cf2d751284119bc43cc6ee95dfc446ffb3dab2cf30.exe windows x86
ac52d79ccce22594a667800213ddaa23
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileW
CreateMutexW
CreateProcessW
CreateSemaphoreW
CreateThread
DeleteCriticalSection
DeleteFileW
DeviceIoControl
EnterCriticalSection
EraseTape
ExpandEnvironmentStringsW
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileW
FindFirstVolumeMountPointW
FindNextFileW
FindNextVolumeMountPointW
FindResourceW
FindVolumeMountPointClose
FlushFileBuffers
FormatMessageW
FreeLibrary
GetComputerNameW
GetCurrentDirectoryA
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatW
GetDiskFreeSpaceExW
GetDriveTypeW
GetEnvironmentVariableW
GetExitCodeThread
GetFileAttributesW
GetFileInformationByHandle
GetLastError
GetLocalTime
GetLocaleInfoW
GetLogicalDriveStringsW
GetModuleFileNameW
GetModuleHandleA
GetNumberFormatW
GetPrivateProfileStringW
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetSystemDirectoryW
CreateEventW
GetSystemTimeAsFileTime
GetTapeParameters
GetTapePosition
GetTapeStatus
GetTickCount
GetTimeFormatW
GetUserDefaultLCID
GetVersionExW
GetVolumeInformationW
GetVolumeNameForVolumeMountPointW
GetVolumePathNameW
GetWindowsDirectoryW
GlobalFree
HeapAlloc
HeapFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryW
LoadResource
LocalFree
LockResource
MultiByteToWideChar
PrepareTape
QueryPerformanceCounter
ReadFile
ReleaseMutex
ReleaseSemaphore
SetCurrentDirectoryW
SetEndOfFile
SetErrorMode
SetEvent
SetFileAttributesW
SetFilePointer
SetLastError
SetTapeParameters
SetTapePosition
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TerminateThread
UnhandledExceptionFilter
VerSetConditionMask
VerifyVersionInfoW
WaitForSingleObject
WriteFile
WritePrivateProfileStringW
WriteTapemark
LoadLibraryExW
CreateDirectoryW
CompareStringW
GetSystemTime
CloseHandle
user32
RegisterClassExW
LoadIconA
LoadIconW
LoadCursorA
gdi32
GetStockObject
advapi32
RegOpenKeyExA
Sections
.text4 Size: 512B - Virtual size: 100B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text3 Size: 512B - Virtual size: 100B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text1 Size: 512B - Virtual size: 100B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 167KB - Virtual size: 167KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 316B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss2 Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ