Static task
static1
Behavioral task
behavioral1
Sample
53b13540d19e5077400291fe464f869e356c4664093fd56a7bbae3ea188190e3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
53b13540d19e5077400291fe464f869e356c4664093fd56a7bbae3ea188190e3.exe
Resource
win10v2004-20220812-en
General
-
Target
53b13540d19e5077400291fe464f869e356c4664093fd56a7bbae3ea188190e3
-
Size
300KB
-
MD5
0c6219fc999cda3e57a360b96a5283e0
-
SHA1
f6b3ebbe81b0eafdbf304dc0d230ad4792f47ee2
-
SHA256
53b13540d19e5077400291fe464f869e356c4664093fd56a7bbae3ea188190e3
-
SHA512
a31219384e1ae34c04ed92cae86c3c6ef74d50caeeab351fa8f8d5111044db3fb7ebbe1336536cf18ddc5a5255e11881cd0911d88f9cb6bf3feef452ff770423
-
SSDEEP
3072:aylMC3de4ylYyfDp2W7cO1Q5BHNa+dsLFhaSpyBMeFl+1ZZu5y+otRyrYvBFzcSK:ayKyxyOuHybN+ISU/zE+XEBCWCv
Malware Config
Signatures
Files
-
53b13540d19e5077400291fe464f869e356c4664093fd56a7bbae3ea188190e3.exe windows x86
16ad9bff2693cdd4162f22eeca570823
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateProcess
GetVersionExW
Sleep
OpenProcess
MultiByteToWideChar
CloseHandle
WideCharToMultiByte
SetEnvironmentVariableA
ReadConsoleW
SetStdHandle
GetFileAttributesExW
InterlockedIncrement
InterlockedDecrement
GetStringTypeW
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
GetLocaleInfoEx
GetStdHandle
GetFileType
GetModuleFileNameW
GetModuleHandleExW
WriteConsoleW
GetLastError
HeapFree
GetSystemTimeAsFileTime
DuplicateHandle
GetCurrentProcess
CreateProcessA
HeapAlloc
HeapReAlloc
GetCommandLineA
RaiseException
RtlUnwind
GetCPInfo
InitializeCriticalSectionAndSpinCount
IsProcessorFeaturePresent
IsDebuggerPresent
ExitProcess
GetProcAddress
AreFileApisANSI
HeapSize
WriteFile
OutputDebugStringW
LoadLibraryExW
LoadLibraryW
IsValidCodePage
GetACP
GetOEMCP
SetLastError
GetCurrentThreadId
GetProcessHeap
GetTimeZoneInformation
WaitForSingleObject
GetExitCodeProcess
CreatePipe
InitOnceExecuteOnce
GetStartupInfoW
GetModuleFileNameA
QueryPerformanceCounter
GetTickCount64
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadFile
SetFilePointerEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetModuleHandleW
CompareStringEx
GetUserDefaultLocaleName
LCMapStringEx
IsValidLocaleName
EnumSystemLocalesEx
CreateFileW
advapi32
CryptDestroyHash
CryptCreateHash
CryptReleaseContext
CryptAcquireContextW
CryptGetHashParam
CryptHashData
rpcrt4
RpcServerListen
RpcServerRegisterIfEx
NdrServerCall2
RpcServerUseProtseqEpW
Sections
.text Size: 190KB - Virtual size: 189KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ