Static task
static1
Behavioral task
behavioral1
Sample
d5fede8cf6585a1eaf0ecfad5fab4e33bb564676cb495a9f74b074ba0c179128.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d5fede8cf6585a1eaf0ecfad5fab4e33bb564676cb495a9f74b074ba0c179128.exe
Resource
win10v2004-20220812-en
General
-
Target
d5fede8cf6585a1eaf0ecfad5fab4e33bb564676cb495a9f74b074ba0c179128
-
Size
600KB
-
MD5
922a01da477e0c568f9a623ed66b27f0
-
SHA1
c95634aced7492f1d006ecb11746d440e35a6837
-
SHA256
d5fede8cf6585a1eaf0ecfad5fab4e33bb564676cb495a9f74b074ba0c179128
-
SHA512
65326c3b7760dd070b2e76c8ea60956bacf66c7aa3b094811f00260e2cf0efbc8c05c562d257412aaab630a56cdc435ae327129adf1687324862524f2f51273b
-
SSDEEP
12288:OAp5SyheBd3peqh+sJOxLX0z5HATvdWdiF5T0/cLCp3JgtF9p7MGBO44iWBI9a+H:OAp5SyheBdRh+ssxLX0z5HATvdWdiF59
Malware Config
Signatures
Files
-
d5fede8cf6585a1eaf0ecfad5fab4e33bb564676cb495a9f74b074ba0c179128.exe windows x64
8fe9374a7129c53a1093c1039129620c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
HeapSetInformation
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleW
SetUnhandledExceptionFilter
Sleep
UnhandledExceptionFilter
msvcrt
__C_specific_handler
_XcptFilter
_cexit
exit
_initterm
_amsg_exit
__setusermatherr
_commode
?terminate@@YAXXZ
_exit
__set_app_type
__getmainargs
_fmode
ulib
??0PATH_ARGUMENT@@QEAA@XZ
?Initialize@WSTRING@@QEAAEPEBDK@Z
?IsValueSet@ARGUMENT@@QEAAEXZ
?Put@ARRAY@@UEAAEPEAVOBJECT@@@Z
?Initialize@ARRAY@@QEAAEKK@Z
??1ARRAY@@UEAA@XZ
??1PATH_ARGUMENT@@UEAA@XZ
?Set@STREAM_MESSAGE@@UEAAEKW4MESSAGE_TYPE@@K@Z
?Initialize@STREAM_MESSAGE@@QEAAEPEAVSTREAM@@00@Z
??1STREAM_MESSAGE@@UEAA@XZ
??0STREAM_MESSAGE@@QEAA@XZ
?Strcat@WSTRING@@QEAAEPEBV1@@Z
??1STRING_ARGUMENT@@UEAA@XZ
??0STRING_ARGUMENT@@QEAA@XZ
?Display@MESSAGE@@QEAAEPEBDZZ
?FreeLibraryHandle@SYSTEM@@SAXPEAX@Z
?QueryLibraryEntryPoint@SYSTEM@@SAP6A_JXZPEBVWSTRING@@0PEAPEAX@Z
?QueryDriveType@SYSTEM@@SA?AW4DRIVE_TYPE@@PEBVWSTRING@@@Z
?Initialize@PATH_ARGUMENT@@QEAAEPEADE@Z
?QueryFullPath@PATH@@QEBAPEAV1@XZ
??1OBJECT@@UEAA@XZ
?Get_Standard_Output_Stream@@YAPEAVSTREAM@@XZ
??0FLAG_ARGUMENT@@QEAA@XZ
?Initialize@FLAG_ARGUMENT@@QEAAEPEAD@Z
??0DSTRING@@QEAA@XZ
?Initialize@STRING_ARGUMENT@@QEAAEPEAD@Z
??1DSTRING@@UEAA@XZ
?Get_Standard_Input_Stream@@YAPEAVSTREAM@@XZ
??0ARGUMENT_LEXEMIZER@@QEAA@XZ
??1ARGUMENT_LEXEMIZER@@UEAA@XZ
?Initialize@ARGUMENT_LEXEMIZER@@QEAAEPEAVARRAY@@@Z
?DoParsing@ARGUMENT_LEXEMIZER@@QEAAEPEAVARRAY@@@Z
?PutSeparators@ARGUMENT_LEXEMIZER@@QEAAXPEBD@Z
?QueryInvalidArgument@ARGUMENT_LEXEMIZER@@QEAAPEAVWSTRING@@XZ
?PrepareToParse@ARGUMENT_LEXEMIZER@@QEAAEPEAVWSTRING@@@Z
?SetCaseSensitive@ARGUMENT_LEXEMIZER@@QEAAXE@Z
??0ARRAY@@QEAA@XZ
?QueryString@WSTRING@@QEBAPEAV1@KK@Z
ifsutil
?DosDriveNameToNtDriveName@IFS_SYSTEM@@SAEPEBVWSTRING@@PEAV2@@Z
?QueryFileSystemName@IFS_SYSTEM@@SAEPEBVWSTRING@@PEAV2@PEAJ1@Z
ntdll
RtlLookupFunctionEntry
RtlVirtualUnwind
RtlCaptureContext
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 168B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 588KB - Virtual size: 2.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE