Win32MiniDumpInit
Static task
static1
Behavioral task
behavioral1
Sample
baef1d3e46a489f8b9b202f0a048af688e21e187901012ffa825cfe140322c85.exe
Resource
win7-20220901-en
General
-
Target
baef1d3e46a489f8b9b202f0a048af688e21e187901012ffa825cfe140322c85
-
Size
345KB
-
MD5
845916baf0d480b69434132f27203d50
-
SHA1
936479051aaaf895bb547ce3ac7f55858d69feae
-
SHA256
baef1d3e46a489f8b9b202f0a048af688e21e187901012ffa825cfe140322c85
-
SHA512
960c29d7dd7a475093187834771dc3d36af0e2e88c2808ba503bc2815f2d77f128a38e05b948ff439dcbc7f507273f22639a94cc7b1d916240bf9e8bd8c3074f
-
SSDEEP
3072:c9x3dGKCbyyDAS9RlLL0akuBFX7UJhlad9QjhFu6ojXmkQwnDqYZyYnjJ8tbOSoe:cv3d/c7PkMFwJhu9yajCiHwcRq3t
Malware Config
Signatures
Files
-
baef1d3e46a489f8b9b202f0a048af688e21e187901012ffa825cfe140322c85.exe windows x86
48dae12303389928de6040e466bd6370
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
DebugBreak
FormatMessageA
FindNextFileA
InterlockedDecrement
FindClose
CreateDirectoryA
FindFirstFileA
GetLongPathNameA
SetFileAttributesA
Sleep
DeleteFileA
RemoveDirectoryA
GetFileAttributesA
GetCurrentProcess
GetProcAddress
LoadLibraryA
GetSystemInfo
GetVersionExA
GetConsoleWindow
OpenProcess
WaitForSingleObject
GetCurrentThreadId
GetCurrentProcessId
GetTempPathA
RaiseException
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetTimeZoneInformation
CompareStringW
CompareStringA
GetFullPathNameA
GetCommandLineA
CreateProcessA
CreateFileA
GetFileInformationByHandle
CreateFileMappingA
MapViewOfFile
GetACP
WideCharToMultiByte
GetLastError
CloseHandle
GetModuleFileNameA
UnmapViewOfFile
GetCurrentDirectoryA
SetCurrentDirectoryA
GetLocaleInfoW
SetFilePointer
FlushFileBuffers
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
InterlockedIncrement
InterlockedExchange
MultiByteToWideChar
HeapFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
ExitProcess
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
HeapAlloc
GetSystemTimeAsFileTime
GetProcessHeap
LCMapStringA
LCMapStringW
GetCPInfo
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
WriteFile
GetStdHandle
HeapSize
ReadFile
GetConsoleCP
GetConsoleMode
SetEnvironmentVariableA
SetEnvironmentVariableW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
user32
MessageBoxA
wsprintfA
shell32
SHGetFileInfoA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Exports
Exports
Sections
.text Size: 216KB - Virtual size: 214KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE