Static task
static1
Behavioral task
behavioral1
Sample
avolkov.exe
Resource
win10-20220812-en
General
-
Target
avolkov.exe
-
Size
902.8MB
-
MD5
d41e0fee0ec6c2e3da56a6dcf53607da
-
SHA1
01f7e8cc5f7f75c2fd4c87b0c1aafae1fd5d26c2
-
SHA256
d75680a5fcfd6839d40e5b4e379726ec0c01278709265ace4f1ba7327886b41c
-
SHA512
d9d0d7476a3637007c1a994156477e19b853e408ec8c4a6a80b69c4a989f81af24747f4450d9b5053812c3fed5a17554ab8d39f9a1d61df50265bd2108f0f868
-
SSDEEP
49152:cGtlqCdIU6i2VwASOzmB2ddPNWk569+DUUezZj5ly3ameczxUvrC0ldPVHzcO/:i+6ZdXw9+W9sWuWTHzd
Malware Config
Signatures
Files
-
avolkov.exe.exe windows x64
ba24d38ccb5e545306440d0d4d70e28c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
bcrypt
BCryptGenRandom
kernel32
WaitForSingleObjectEx
CompareFileTime
GetSystemTimeAsFileTime
GetEnvironmentVariableA
GetStdHandle
GetFileType
ReadFile
PeekNamedPipe
WaitForMultipleObjects
VerSetConditionMask
VerifyVersionInfoW
RtlCaptureContext
MoveFileExA
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
WideCharToMultiByte
MultiByteToWideChar
FormatMessageW
SetLastError
Sleep
GetTickCount
QueryPerformanceCounter
CloseHandle
LoadLibraryA
GetProcAddress
GetModuleHandleA
FreeLibrary
GetSystemDirectoryA
QueryPerformanceFrequency
SleepEx
DeleteCriticalSection
InitializeCriticalSectionEx
LeaveCriticalSection
EnterCriticalSection
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
CreateProcessA
GetLastError
WaitForSingleObject
RtlUnwind
RtlLookupFunctionEntry
SystemTimeToFileTime
GetSystemTime
FindFirstFileW
LoadLibraryW
ConvertThreadToFiber
ConvertFiberToThread
CreateFiber
DeleteFiber
SwitchToFiber
ReadConsoleA
SetConsoleMode
GetEnvironmentVariableW
WriteConsoleW
HeapSize
GetTimeZoneInformation
DeleteFileW
SetConsoleCtrlHandler
GetProcessHeap
GetStringTypeW
RtlUnwindEx
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetEnvironmentVariableW
EncodePointer
RaiseException
RtlPcToFileHeader
CreateFileW
GetDriveTypeW
GetFileInformationByHandle
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
SetFilePointerEx
WriteFile
GetModuleFileNameW
ExitProcess
GetConsoleMode
ReadConsoleW
GetConsoleOutputCP
HeapFree
GetFileSizeEx
HeapAlloc
HeapReAlloc
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
FlushFileBuffers
GetFileAttributesExW
SetStdHandle
SetEndOfFile
GetCurrentDirectoryW
GetFullPathNameW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
LoadLibraryExW
crypt32
CertOpenStore
CertFindCertificateInStore
CertOpenSystemStoreA
CertGetIntendedKeyUsage
CertGetEnhancedKeyUsage
CertFreeCertificateContext
CertEnumCertificatesInStore
CertCloseStore
CertDuplicateCertificateContext
CertGetCertificateContextProperty
ws2_32
freeaddrinfo
getaddrinfo
listen
htonl
accept
select
__WSAFDIsSet
WSACleanup
WSAStartup
inet_pton
WSAIoctl
WSASetLastError
socket
setsockopt
sendto
ioctlsocket
gethostname
recvfrom
ntohs
htons
getsockopt
getsockname
getpeername
connect
bind
recv
WSAGetLastError
closesocket
WSAWaitForMultipleEvents
WSAResetEvent
WSAEventSelect
WSAEnumNetworkEvents
WSACreateEvent
WSACloseEvent
send
getnameinfo
shutdown
user32
MessageBoxW
GetUserObjectInformationW
GetProcessWindowStation
advapi32
DeregisterEventSource
RegisterEventSourceW
ReportEventW
CryptAcquireContextW
CryptReleaseContext
CryptDestroyKey
CryptSetHashParam
CryptGetProvParam
CryptGetUserKey
CryptExportKey
CryptDecrypt
CryptCreateHash
CryptDestroyHash
CryptSignHashW
CryptEnumProvidersW
Sections
.text Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 659KB - Virtual size: 658KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 900.0MB - Virtual size: 900.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ