Static task
static1
Behavioral task
behavioral1
Sample
161c423a42b4e2c3a1c974072d8be6793f56efe364286b8a0cdaef5476e1c9e4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
161c423a42b4e2c3a1c974072d8be6793f56efe364286b8a0cdaef5476e1c9e4.exe
Resource
win10v2004-20221111-en
General
-
Target
161c423a42b4e2c3a1c974072d8be6793f56efe364286b8a0cdaef5476e1c9e4
-
Size
126KB
-
MD5
ca079b71ac6148db0f7ee6711064c17a
-
SHA1
1ae17c9d8c07a8c5436e0938ac490aaaf756b79d
-
SHA256
6faa96b0a73b6ba2dea06b8f49325922a0cd8f9fb817bcb20c92caf4e3b80417
-
SHA512
5470088e9ce98edad79f0622a13e384401c60ae0f0e576e1e808a252bf3e79954d4e7a686e1fce0475cb754eaddf5b42bfbf0e1578ac59fa3a4c6f4aec4a6d83
-
SSDEEP
3072:gFZz/jCTDSjhkJUUqQjLZonXvQnntl0AlR3PWihLQ:WQD9zqQCYtqoPtQ
Malware Config
Signatures
Files
-
161c423a42b4e2c3a1c974072d8be6793f56efe364286b8a0cdaef5476e1c9e4.zip
-
161c423a42b4e2c3a1c974072d8be6793f56efe364286b8a0cdaef5476e1c9e4.exe windows x86
c1010897c67d377f5fa28ba0ceba197c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindNextFileA
WriteConsoleInputW
EnumDateFormatsA
OpenMutexA
GetConsoleAliasesLengthW
CopyFileExW
ReadConsoleOutputCharacterA
SetVolumeLabelA
GetEnvironmentStrings
VerifyVersionInfoW
QueryDosDeviceA
EnumCalendarInfoExA
RequestWakeupLatency
LocalSize
AddConsoleAliasA
CreateFileW
GetMailslotInfo
GetWindowsDirectoryW
GetModuleHandleW
VirtualFree
FindNextVolumeMountPointA
CreateDirectoryExW
GetLogicalDriveStringsW
ReadConsoleInputW
FindNextVolumeMountPointW
OpenWaitableTimerA
GetVersionExA
SearchPathA
IsSystemResumeAutomatic
CallNamedPipeA
GetCurrentDirectoryA
GetDriveTypeA
CreateMailslotW
BuildCommDCBAndTimeoutsA
GetProcAddress
GetModuleHandleA
GlobalAlloc
MoveFileWithProgressA
GetBinaryTypeA
GetThreadSelectorEntry
GetCommandLineW
LocalFlags
FindFirstChangeNotificationW
VerifyVersionInfoA
CancelTimerQueueTimer
GetConsoleTitleW
CopyFileW
CreateTimerQueueTimer
FindResourceA
FormatMessageA
CreateJobObjectA
ReadConsoleOutputAttribute
GetConsoleFontSize
FindFirstVolumeA
InterlockedIncrement
GetACP
HeapWalk
EnumDateFormatsW
InterlockedExchangeAdd
GetConsoleTitleA
InterlockedCompareExchange
EnumCalendarInfoA
GetConsoleAliasExesLengthW
InterlockedExchange
GetEnvironmentStringsW
GetVolumeNameForVolumeMountPointA
SetCalendarInfoA
TerminateThread
MoveFileW
AddAtomW
FreeEnvironmentStringsA
SetConsoleTitleW
SetVolumeMountPointA
GetAtomNameW
SetConsoleActiveScreenBuffer
GetOEMCP
GetProcessIoCounters
GlobalFindAtomW
GetTickCount
GetVolumeInformationW
EnumSystemCodePagesW
InterlockedDecrement
LoadLibraryW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
RtlUnwind
GetStartupInfoW
HeapAlloc
GetLastError
HeapFree
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
FreeEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
GetCPInfo
IsValidCodePage
HeapSize
LoadLibraryA
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
FlushFileBuffers
ReadFile
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CloseHandle
CreateFileA
DeleteFileA
user32
GetMessageExtraInfo
GetComboBoxInfo
gdi32
GetBoundsRect
advapi32
SetThreadToken
Sections
.text Size: 102KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 70KB - Virtual size: 35.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ