Static task
static1
Behavioral task
behavioral1
Sample
83dfa63c964779e1639d490a18900318.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
83dfa63c964779e1639d490a18900318.exe
Resource
win10v2004-20220812-en
General
-
Target
83dfa63c964779e1639d490a18900318.exe
-
Size
654KB
-
MD5
83dfa63c964779e1639d490a18900318
-
SHA1
6e9a2a12b3a2930936982831d00f5133f0eced86
-
SHA256
c0183ded48b43c6bebca6093caf1d8d5a85f7c651aeb6caf86e55819d14238ba
-
SHA512
e8557cb374af771edbf87ade3038726fa40a28849b603523abe423f58567924ee96fb727f8287f79c5c101f8edadb7a7b9f09d87de3e37704a6ec2f94bb5a29c
-
SSDEEP
6144:4a+uZfHoxq3olMHVsmy8IJ2p0vva0BAOZvdxCyY:4CfHoxqfJvpi9xCyY
Malware Config
Signatures
Files
-
83dfa63c964779e1639d490a18900318.exe.exe windows x86
6127061e3687375ba3dda2ccb43cca99
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindNextFileA
GetWindowsDirectoryA
LocalAlloc
LocalFree
WaitForSingleObject
CreateThread
GetTickCount64
VirtualAllocEx
GetFileAttributesA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
FindFirstFileA
GetVersion
GetModuleHandleA
GetModuleHandleW
lstrcmpA
lstrcmpiA
lstrlenA
WriteConsoleW
HeapSize
CreateFileW
SetStdHandle
GetProcessHeap
GetCurrentThreadId
GetCommandLineA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
WideCharToMultiByte
LCMapStringEx
GetStringTypeW
GetCPInfo
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
TerminateProcess
RaiseException
RtlUnwind
GetLastError
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
WriteFile
HeapFree
HeapAlloc
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
CloseHandle
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
ReadFile
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
MoveFileExW
HeapReAlloc
SetEndOfFile
gdi32
GetEnhMetaFileW
ole32
CoInitializeEx
shlwapi
PathFindOnPathA
PathGetDriveNumberA
PathFileExistsA
PathAppendA
PathFindSuffixArrayA
Sections
.text Size: 207KB - Virtual size: 207KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
fdvdf Size: - Virtual size: 628B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 134KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 296KB - Virtual size: 296KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ