Static task
static1
Behavioral task
behavioral1
Sample
fae31e1be55cd9d06246f1dbfd5d409876f4e2cd77d5b5ca84ec15935869f4db.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fae31e1be55cd9d06246f1dbfd5d409876f4e2cd77d5b5ca84ec15935869f4db.exe
Resource
win10v2004-20220812-en
General
-
Target
fae31e1be55cd9d06246f1dbfd5d409876f4e2cd77d5b5ca84ec15935869f4db
-
Size
106KB
-
MD5
ef1ee44d57ab3d3175c2b4fee8a78b88
-
SHA1
cb628c612eed1c30569a43c5b8c9ebb6e99b963c
-
SHA256
fae31e1be55cd9d06246f1dbfd5d409876f4e2cd77d5b5ca84ec15935869f4db
-
SHA512
bbfbfc41f4b2bd425b2a5d58587dfc71c3aa3b7f9c28991159a80240a9084f6d3b3fb269e15b3ec91f43ea1a73c466468f3fd95f250e6988ec849180272dd67b
-
SSDEEP
1536:whgy4Bh9HfvC66TRpI0A3wPcwXcRueyPxa9y4JT3YjVbNUimVfB4nTEo+xD:PyWhVg7DPPiy4JeKikfBRbD
Malware Config
Signatures
Files
-
fae31e1be55cd9d06246f1dbfd5d409876f4e2cd77d5b5ca84ec15935869f4db.exe windows x86
4fdb1ae823ab4db0e22308333ee908ad
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EraseTape
GetProcessIoCounters
TlsGetValue
FindFirstFileExW
CreateJobSet
GetProcessTimes
MulDiv
ResetEvent
GetNamedPipeHandleStateA
LockResource
LocalShrink
UnlockFileEx
GetWriteWatch
SetSystemTimeAdjustment
QueryMemoryResourceNotification
AssignProcessToJobObject
GetProcessHeap
CreateFiberEx
ReplaceFileW
FlushInstructionCache
CreateMemoryResourceNotification
GetModuleFileNameA
ReleaseSemaphore
GetCommandLineW
GetNamedPipeInfo
IsWow64Process
GetThreadPriority
GetFileTime
SetFilePointerEx
GetFileInformationByHandle
ReplaceFileA
TlsSetValue
GetPriorityClass
DecodePointer
GetProcessAffinityMask
InitAtomTable
GetThreadContext
GetThreadSelectorEntry
SetLastError
FreeResource
GlobalCompact
LocalUnlock
GetVersion
SetSystemPowerState
SetHandleCount
CreateIoCompletionPort
SetProcessPriorityBoost
FlushViewOfFile
GlobalUnWire
ClearCommBreak
GetAtomNameW
GetExitCodeThread
CreateFiber
GetProcessId
GetFileSizeEx
PulseEvent
FindVolumeClose
GetHandleInformation
LockFile
FindNextChangeNotification
SetMessageWaitingIndicator
GetTapeParameters
SetProcessWorkingSetSize
SetMailslotInfo
DeleteAtom
GetFileType
CheckRemoteDebuggerPresent
GetCommModemStatus
WTSGetActiveConsoleSessionId
SetInformationJobObject
TransmitCommChar
DisconnectNamedPipe
GetCurrentProcess
GlobalDeleteAtom
ResetWriteWatch
SetProcessShutdownParameters
CreateFileMappingW
FindCloseChangeNotification
GetThreadTimes
OpenProcess
GetFileAttributesExW
GetCommTimeouts
DisableThreadLibraryCalls
ConvertThreadToFiber
GetNamedPipeHandleStateW
GetCurrentThreadId
SetStdHandle
ReleaseMutex
QueueUserAPC
SetTapeParameters
PrepareTape
RequestWakeupLatency
SetCommState
GetStdHandle
GetCurrentThread
PeekNamedPipe
GetProcessHandleCount
GetThreadPriorityBoost
EnterCriticalSection
LeaveCriticalSection
GetCommandLineA
GetStartupInfoA
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
GetProcAddress
TlsAlloc
TlsFree
GetLastError
LCMapStringW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
WideCharToMultiByte
DeleteCriticalSection
Sleep
HeapFree
ExitProcess
WriteFile
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
RtlUnwind
SetFilePointer
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
HeapAlloc
HeapReAlloc
VirtualAlloc
LoadLibraryA
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
HeapSize
CloseHandle
CreateFileA
Sections
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ