Static task
static1
Behavioral task
behavioral1
Sample
a94fecf657d879f0a761e6009883cdb340045f8df5beb1a9ec066f80136cdaa4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a94fecf657d879f0a761e6009883cdb340045f8df5beb1a9ec066f80136cdaa4.exe
Resource
win10v2004-20220812-en
General
-
Target
a94fecf657d879f0a761e6009883cdb340045f8df5beb1a9ec066f80136cdaa4
-
Size
1.1MB
-
MD5
0d4f8665636a1d5563a27faab047fce0
-
SHA1
63cde92cf072a0cbcb6903175fd6e5b1643bd634
-
SHA256
a94fecf657d879f0a761e6009883cdb340045f8df5beb1a9ec066f80136cdaa4
-
SHA512
1553638f3603692d1149bd67cb99bc5d0f57c11157d38f5bc431c236777239041bcd98b4b4f367a9b9164d98b32a75ec3fd60576195eb69d05069c37e0d96cc8
-
SSDEEP
24576:+cCm0JeT5QfKfhpRliZ7j0VL/vIkLRar3xJuwV/95WFEQU:+rJeT5QfKfhpRlix0VL/vFnE/wU
Malware Config
Signatures
Files
-
a94fecf657d879f0a761e6009883cdb340045f8df5beb1a9ec066f80136cdaa4.exe windows x86
848a68bbb9bcf82ba383e93faf5b1651
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
GetLastError
CloseHandle
SetFilePointer
ReadFile
WriteFile
FindFirstFileA
FindClose
DeleteFileA
MoveFileA
GetExitCodeProcess
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetThreadLocale
LoadLibraryA
GetStdHandle
FormatMessageA
IsDebuggerPresent
GetModuleHandleA
GetProcAddress
FreeLibrary
InterlockedExchange
Sleep
TlsGetValue
TlsSetValue
TlsFree
TlsAlloc
SetLastError
WaitForSingleObject
GetFileType
VirtualAlloc
VirtualFree
ReleaseMutex
GetCurrentThreadId
CreateMutexA
SetEndOfFile
SetConsoleCtrlHandler
GetACP
GetCommandLineA
SetErrorMode
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
SetEvent
CreateEventA
ExitThread
TerminateThread
CreateThread
GetFileInformationByHandle
GetFullPathNameA
GetTempFileNameA
GetTempPathA
CreateProcessA
SetThreadPriority
GetVersionExA
OpenFileMappingA
CreateFileMappingA
MapViewOfFile
IsBadReadPtr
GetHandleInformation
UnmapViewOfFile
FlushFileBuffers
HeapSetInformation
InterlockedIncrement
InterlockedDecrement
DecodePointer
GetModuleHandleW
ExitProcess
EncodePointer
ResumeThread
HeapValidate
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
SetStdHandle
GetCurrentProcessId
GetTimeZoneInformation
GetSystemTimeAsFileTime
MultiByteToWideChar
RaiseException
lstrlenA
LoadLibraryW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoW
GetCurrentThread
HeapCreate
HeapDestroy
GetModuleFileNameW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FatalAppExitA
GetOEMCP
GetCPInfo
IsValidCodePage
GetLocaleInfoW
RtlUnwind
LCMapStringW
HeapAlloc
HeapReAlloc
HeapSize
HeapQueryInformation
HeapFree
GetFileAttributesA
WriteConsoleW
GetProcessHeap
VirtualQuery
OutputDebugStringA
OutputDebugStringW
CompareStringW
SetEnvironmentVariableA
GetStringTypeW
GetLocaleInfoA
CreateFileW
imagehlp
SymCleanup
SymInitialize
StackWalk64
Sections
.text Size: 906KB - Virtual size: 906KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text1 Size: 512B - Virtual size: 80B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 173KB - Virtual size: 173KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 729KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.trace Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ