Static task
static1
Behavioral task
behavioral1
Sample
4459c4b0a6c40f78e4fd2d51e6677fed19f43efabdcb4282047bc90caeddfbbb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4459c4b0a6c40f78e4fd2d51e6677fed19f43efabdcb4282047bc90caeddfbbb.exe
Resource
win10v2004-20220812-en
General
-
Target
4459c4b0a6c40f78e4fd2d51e6677fed19f43efabdcb4282047bc90caeddfbbb
-
Size
136KB
-
MD5
3a690b73d572227855e933a96f0bb73a
-
SHA1
1993479eb954e4f0ef87903642f597c79d752f4b
-
SHA256
4459c4b0a6c40f78e4fd2d51e6677fed19f43efabdcb4282047bc90caeddfbbb
-
SHA512
234c8fca2c357f0f623e8fcc19a58cce8aee4b4cc75c67c214253752835505ce4e7b353f8792d2cc4f626faa1b0e48d26e7986c99df76538502f3793aeeb684a
-
SSDEEP
3072:eUrKEL85tEhRBr2HOaigW1957nFqihYqyZGVxTmh:eU+ELH6w57nls6VM
Malware Config
Signatures
Files
-
4459c4b0a6c40f78e4fd2d51e6677fed19f43efabdcb4282047bc90caeddfbbb.exe windows x86
830f9224a0f77120d9efb3ccff27cc5b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFiber
GetTapeParameters
LockResource
GetProcessTimes
LocalShrink
GetProcessIoCounters
TransmitCommChar
SetTapeParameters
GetFileSize
LocalUnlock
IsWow64Process
GetProcessHeap
EraseTape
GetCommTimeouts
GetCurrentProcess
PostQueuedCompletionStatus
ConvertThreadToFiber
CreateIoCompletionPort
GetCommandLineA
SetSystemTimeAdjustment
LocalCompact
CancelWaitableTimer
GetProcessId
EncodeSystemPointer
SetHandleCount
FindFirstFileExW
AssignProcessToJobObject
ClearCommBreak
GetModuleFileNameA
GetNumaNodeProcessorMask
WTSGetActiveConsoleSessionId
CreateJobSet
CreateFileMappingW
FlushInstructionCache
ReleaseSemaphore
ConvertFiberToThread
OpenProcess
ResetWriteWatch
IsProcessInJob
GetLogicalDrives
GetFileType
CreateTimerQueue
ReadFileScatter
SetProcessPriorityBoost
GetCommandLineW
EncodePointer
CreateFiberEx
PrepareTape
ClearCommError
GetProcessHandleCount
SetMailslotInfo
GetDevicePowerState
GetThreadPriority
GetFileTime
SetMessageWaitingIndicator
TlsGetValue
RtlCaptureStackBackTrace
InitAtomTable
GetLastError
MultiByteToWideChar
WideCharToMultiByte
HeapAlloc
InterlockedDecrement
GetCPInfo
GetVersionExA
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InterlockedIncrement
GetACP
GetOEMCP
GetProcAddress
GetModuleHandleW
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
OutputDebugStringA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
VirtualAlloc
HeapReAlloc
HeapDestroy
HeapCreate
GetModuleHandleA
ExitProcess
WriteFile
GetStdHandle
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoA
Sleep
InitializeCriticalSection
RtlUnwind
LoadLibraryExA
VirtualProtect
GetSystemInfo
VirtualQuery
Sections
.text Size: 109KB - Virtual size: 109KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ