Static task
static1
Behavioral task
behavioral1
Sample
95a200dab72723d55843ddcec44503c15b20105a67ec07f1818706dd94bdd610.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
95a200dab72723d55843ddcec44503c15b20105a67ec07f1818706dd94bdd610.exe
Resource
win10v2004-20221111-en
General
-
Target
95a200dab72723d55843ddcec44503c15b20105a67ec07f1818706dd94bdd610
-
Size
319KB
-
MD5
22eca910ac18323600f00d75f4769d10
-
SHA1
e7ff29a791a9f1d8eb7cf80c637c7902412eb26d
-
SHA256
95a200dab72723d55843ddcec44503c15b20105a67ec07f1818706dd94bdd610
-
SHA512
051878982dc005d0b401243128f7e2d0b9e5969de5e4a1ba9d938966509d175cfd7c2e49b9034d8c56e04497b15d615b8bcbd0b57ada3328db7ad805b3d7e15b
-
SSDEEP
6144:6Dn19H3xBVM7+08j0wZceJt7/W6kidZy8Tp0cf8aF:6719EEZrt7/W6kidQ8Tp0M
Malware Config
Signatures
Files
-
95a200dab72723d55843ddcec44503c15b20105a67ec07f1818706dd94bdd610.exe windows x86
3042cef5abd8bd2a0679b85353f3270c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeLibrary
SetUnhandledExceptionFilter
GetCurrentProcess
LoadLibraryW
TerminateProcess
CreateFileW
GetProcAddress
GetCurrentThreadId
CloseHandle
GetCurrentProcessId
EnterCriticalSection
LeaveCriticalSection
CreateProcessA
WriteFile
lstrlenW
GetLocalTime
VirtualQuery
GetModuleFileNameW
SetFilePointer
GetSystemInfo
GlobalMemoryStatusEx
GetWindowsDirectoryW
GetModuleHandleW
GetDiskFreeSpaceExW
GetDiskFreeSpaceW
lstrcpyW
IsBadWritePtr
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
LockResource
GetVersionExW
GetModuleFileNameA
SetEvent
CreateEventW
WaitForSingleObject
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
OpenProcess
WideCharToMultiByte
MultiByteToWideChar
InitializeCriticalSection
DeleteCriticalSection
Sleep
GetSystemTimeAsFileTime
CompareStringW
GetProcessHeap
SetEndOfFile
CreateFileA
SetStdHandle
WriteConsoleW
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetCurrentDirectoryW
GetTimeZoneInformation
GetTickCount
QueryPerformanceCounter
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
EncodePointer
DecodePointer
GetLastError
SetConsoleCtrlHandler
UnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
HeapFree
HeapAlloc
HeapReAlloc
RtlUnwind
GetCommandLineW
HeapSetInformation
GetStartupInfoW
MoveFileA
CreateDirectoryA
GetDriveTypeW
GetFullPathNameA
RaiseException
GetCPInfo
LCMapStringW
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetStdHandle
GetLocaleInfoW
IsProcessorFeaturePresent
HeapSize
HeapCreate
SetHandleCount
GetFileType
GetConsoleCP
GetConsoleMode
ReadFile
FlushFileBuffers
GetACP
GetOEMCP
IsValidCodePage
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetEnvironmentVariableA
user32
GetSystemMetrics
wvsprintfW
shlwapi
PathRemoveFileSpecA
PathFileExistsW
PathRemoveFileSpecW
PathRemoveExtensionW
psapi
GetModuleFileNameExA
EnumProcessModules
Sections
.text Size: 175KB - Virtual size: 175KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
�7ţu� Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE