Static task
static1
Behavioral task
behavioral1
Sample
example.exe
Resource
win10v2004-20220901-en
General
-
Target
example.exe
-
Size
3.6MB
-
MD5
48efc5f2761cdc6aa7a9c89cddf636b7
-
SHA1
c72d8f7eae1ce12b4c6e99cb59f070f2a9a0ccbb
-
SHA256
3c477dcc932e74020bed1d79f3019407b6c11ee8475b8e3d6d5cabd9dbd8c258
-
SHA512
4d0a8695f824b691bdd0b02eed2247a06f0f603626911d07ae164b9e94e30029b4c1b4548a6d4488a165418dabb1bb7c826279c35512d4c0bac024f53b782fd4
-
SSDEEP
49152:VGtlqvYIU6iNWqyQHPtQVo3mlTozYzoPxBbHi8ecl0IAzSqjJhDgxiPE/aYT/+Ow:3+NWqJko3mlcujImRSq7GX/acru
Malware Config
Signatures
Files
-
example.exe.exe windows x64
a35f16e5113e122f40b48bfaf6994ed1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
SetConsoleTitleA
SetConsoleTextAttribute
SetConsoleScreenBufferInfoEx
GetConsoleScreenBufferInfoEx
SetConsoleMode
GetConsoleMode
LocalFree
LoadLibraryW
LoadLibraryA
LoadLibraryExA
GetProcAddress
GetModuleHandleW
FreeLibrary
VirtualFree
VirtualProtect
VirtualAlloc
GetWindowsDirectoryW
GetCurrentProcess
Sleep
DeleteCriticalSection
InitializeCriticalSectionEx
GetProcessHeap
WriteConsoleW
SetEndOfFile
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
SetStdHandle
GetFullPathNameW
GetCurrentDirectoryW
GetTimeZoneInformation
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetFileAttributesExW
CreateProcessW
GetExitCodeProcess
WaitForSingleObject
GetConsoleOutputCP
GetCommandLineW
GetCommandLineA
GetModuleFileNameW
SetConsoleCtrlHandler
SetFilePointerEx
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetFileInformationByHandle
GetDriveTypeW
FreeLibraryAndExitThread
ExitThread
CreateThread
VirtualQuery
GetSystemInfo
ExitProcess
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
GetLastError
DecodePointer
WriteFile
ReadFile
GetFileSize
GetFileAttributesA
DeleteFileW
GetStdHandle
DeviceIoControl
CloseHandle
CreateFileW
LoadLibraryExW
RtlUnwindEx
RtlPcToFileHeader
InterlockedPushEntrySList
RaiseException
OutputDebugStringW
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
InitializeSListHead
CreateEventW
ResetEvent
SetLastError
QueryPerformanceCounter
QueryPerformanceFrequency
FormatMessageA
GetTickCount
EnterCriticalSection
LeaveCriticalSection
SleepEx
GetSystemDirectoryA
GetModuleHandleA
VerifyVersionInfoA
WaitForSingleObjectEx
ExpandEnvironmentStringsA
GetFileType
PeekNamedPipe
WaitForMultipleObjects
CreateFileA
GetFileSizeEx
GetEnvironmentVariableW
WideCharToMultiByte
ReadConsoleA
ReadConsoleW
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
MultiByteToWideChar
FormatMessageW
GetCurrentProcessId
GetSystemTimeAsFileTime
SwitchToFiber
DeleteFiber
CreateFiber
ConvertFiberToThread
ConvertThreadToFiber
FindClose
FindFirstFileW
FindNextFileW
GetSystemTime
SystemTimeToFileTime
EncodePointer
LCMapStringEx
GetStringTypeW
GetCPInfo
SetEvent
RtlUnwind
user32
FindWindowA
MessageBoxA
PostThreadMessageA
FindWindowExA
GetWindowThreadProcessId
MessageBoxW
GetUserObjectInformationW
GetProcessWindowStation
UnhookWindowsHookEx
SetWindowsHookExA
advapi32
CryptGetHashParam
CryptSignHashW
CryptDecrypt
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptDestroyKey
CryptAcquireContextW
ReportEventW
RegisterEventSourceW
OpenProcessToken
CopySid
GetLengthSid
GetTokenInformation
IsValidSid
CryptAcquireContextA
CryptReleaseContext
ConvertSidToStringSidA
CryptGenRandom
CryptCreateHash
CryptHashData
CryptDestroyHash
DeregisterEventSource
CryptEnumProvidersW
shell32
ShellExecuteW
ShellExecuteA
ws2_32
getaddrinfo
ioctlsocket
listen
htonl
socket
ntohl
recv
closesocket
accept
WSACleanup
WSAStartup
WSAIoctl
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
connect
bind
recvfrom
sendto
freeaddrinfo
WSASetLastError
select
__WSAFDIsSet
inet_pton
WSAGetLastError
getnameinfo
shutdown
send
gethostname
wldap32
ord27
ord26
ord22
ord41
ord50
ord33
ord60
ord211
ord46
ord143
ord79
ord32
ord45
ord30
ord301
ord200
ord35
crypt32
CertOpenStore
CertCloseStore
CertEnumCertificatesInStore
CertFindCertificateInStore
CertFreeCertificateContext
CryptStringToBinaryA
CertAddCertificateContextToStore
CertGetCertificateContextProperty
CryptQueryObject
CertCreateCertificateChainEngine
CertFreeCertificateChainEngine
CertGetCertificateChain
CertFreeCertificateChain
CertDuplicateCertificateContext
CertGetNameStringA
userenv
UnloadUserProfile
rpcrt4
UuidToStringA
RpcStringFreeA
UuidCreate
ntdll
RtlLookupFunctionEntry
RtlVirtualUnwind
VerSetConditionMask
RtlImageNtHeader
RtlCaptureContext
bcrypt
BCryptGenRandom
Sections
.text Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 791KB - Virtual size: 790KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 306KB - Virtual size: 366KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ