Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
302KB
-
MD5
5dca82be519d7e050fed27b83c1a30d5
-
SHA1
3e719223f3546f0717210bf0402306002dc35b31
-
SHA256
7d6ffb00bb624b7454b2d8506d0546c2abfc096661c1632a636f263c7340c4ba
-
SHA512
f6b7e35dac7f29539d3fc48b019bfde516cfcd9804fa7f92c211bfda9463239c9348166142edd566a9bfce2962d90860e56533a7dc7e5f88060326280fb9ce8e
-
SSDEEP
6144:o/LXyQiSJtohNnBd6d5vH5OE1KnvKGJYlzk0I:U7yQDkNv6rv5OE1KnvKZlzk
Malware Config
Signatures
Files
-
file.exe.exe windows x86
37978a302cc66e462201a896d03c42ea
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVolumeInformationA
SetComputerNameW
LocalSize
InterlockedDecrement
GetTickCount
SearchPathA
GetConsoleAliasExesLengthW
EnumSystemCodePagesW
TlsGetValue
CopyFileExA
MoveFileWithProgressW
VerifyVersionInfoW
LocalLock
WaitForDebugEvent
GlobalGetAtomNameW
MapViewOfFileEx
GetModuleHandleW
VirtualProtect
GlobalDeleteAtom
SizeofResource
WriteConsoleInputW
CopyFileW
CancelWaitableTimer
GlobalAlloc
FindResourceW
OpenEventA
GetThreadPriority
CallNamedPipeW
GetProcAddress
ReadConsoleA
GetConsoleAliasesLengthW
OpenFileMappingA
GetSystemWindowsDirectoryA
MoveFileW
GetOEMCP
GetMailslotInfo
GetConsoleAliasW
GetFileInformationByHandle
GetDiskFreeSpaceExW
DefineDosDeviceW
GetCPInfo
SetProcessAffinityMask
GlobalFindAtomW
WriteConsoleW
ReleaseActCtx
FindNextVolumeA
LoadLibraryA
InitializeCriticalSection
GetComputerNameW
CancelDeviceWakeupRequest
InterlockedIncrement
EnterCriticalSection
GetPrivateProfileStructA
InterlockedExchangeAdd
GetConsoleAliasExesLengthA
EnumCalendarInfoA
InterlockedExchange
GetNamedPipeHandleStateA
SetFileApisToANSI
GetModuleHandleA
LoadLibraryW
Sleep
DeleteCriticalSection
LeaveCriticalSection
RaiseException
RtlUnwind
ExitProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetLastError
DeleteFileA
GetStartupInfoW
HeapFree
HeapAlloc
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
WriteFile
GetStdHandle
GetModuleFileNameA
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetFileType
GetStartupInfoA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
VirtualAlloc
HeapReAlloc
GetACP
IsValidCodePage
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
WideCharToMultiByte
SetFilePointer
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
FlushFileBuffers
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
ReadFile
CloseHandle
CreateFileA
advapi32
SetThreadToken
Sections
.text Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 208KB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ