Static task
static1
Behavioral task
behavioral1
Sample
b64988d82626a9832a605545f6d529a7422503243c18f8e49f3a91b4cc1ddac0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b64988d82626a9832a605545f6d529a7422503243c18f8e49f3a91b4cc1ddac0.exe
Resource
win10v2004-20220812-en
General
-
Target
b64988d82626a9832a605545f6d529a7422503243c18f8e49f3a91b4cc1ddac0
-
Size
160KB
-
MD5
a36795ac55f20ed0ffde8d98692aef20
-
SHA1
8b53d97a65fbf77c72e8777267ca8a792092c28e
-
SHA256
b64988d82626a9832a605545f6d529a7422503243c18f8e49f3a91b4cc1ddac0
-
SHA512
4b4a2762e7d3d9ae5c152b6fa588716fa6f4eb29f965b2e7188c241b3110d75c055b6072adf824eddb919deb16e35b5d9171a2070f561ac6c568725681779480
-
SSDEEP
3072:TvJU8qJKCjW6slXu4kCPsSi9IWukjhGgfFxVnr97Ipm:Tv63Q+4kvIWuk9GgfFxVnJsw
Malware Config
Signatures
Files
-
b64988d82626a9832a605545f6d529a7422503243c18f8e49f3a91b4cc1ddac0.exe windows x86
a8c1c89b099d6f61acd6b1d384977dad
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
VirtualAlloc
LoadLibraryExA
GetVersionExA
CloseHandle
IsProcessorFeaturePresent
HeapSize
HeapReAlloc
GetStringTypeW
LCMapStringW
RtlUnwind
MultiByteToWideChar
TerminateProcess
IsDebuggerPresent
UnhandledExceptionFilter
LoadLibraryW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
EnterCriticalSection
CreateFileW
ReadFile
Sleep
GetProcessHeap
GetTickCount
HeapFree
HeapAlloc
lstrlenA
SetFilePointer
GetFileSize
GetCurrentProcess
GetEnvironmentVariableW
GetCommandLineA
HeapSetInformation
GetStartupInfoW
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
DecodePointer
TlsFree
InterlockedIncrement
GetModuleHandleW
SetLastError
GetCurrentThreadId
GetLastError
InterlockedDecrement
SetUnhandledExceptionFilter
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
VirtualQuery
user32
EndPaint
DestroyWindow
GetMessageA
RegisterClassExA
PostQuitMessage
LoadIconA
wsprintfA
GetClientRect
SendMessageA
BeginPaint
TranslateMessage
MessageBoxA
CreateWindowExA
DefWindowProcA
ShowWindow
DispatchMessageA
GetSystemMetrics
FindWindowA
LoadCursorA
gdi32
SelectObject
SetTextColor
CreateFontA
DeleteObject
TextOutA
CreatePen
Chord
GetTextMetricsA
GetStockObject
iphlpapi
GetTcpStatistics
Sections
.text Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ