Static task
static1
Behavioral task
behavioral1
Sample
dfe42379cde13cbfba49d1b08d5af234030b43ffa07656cb190c818a437d63e3.exe
Resource
win10v2004-20220901-en
General
-
Target
dfe42379cde13cbfba49d1b08d5af234030b43ffa07656cb190c818a437d63e3
-
Size
211KB
-
MD5
e7bf155224d373be4b67b0ebf8e3f648
-
SHA1
63b23ae1e831e541569ce19404a5a4a713ed43a8
-
SHA256
dfe42379cde13cbfba49d1b08d5af234030b43ffa07656cb190c818a437d63e3
-
SHA512
0a05191e5ab39b924f4ebfde2c0d97b5307375f8ee8f68c3d2679e542d5cc2b86ef73878a55870ab8b47e7ca812a330e4fe13d95156a279239d33c01dd9d72db
-
SSDEEP
3072:nJFvWzOxnxiIS3ouh0L8qV3NFRZzFPk2I111KYTI1Uk1:nezOxnEo+0LnV9RHMzTy1
Malware Config
Signatures
Files
-
dfe42379cde13cbfba49d1b08d5af234030b43ffa07656cb190c818a437d63e3.exe windows x86
6bccb2092bd7aeb27dff9f411ff135d9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
GetFileSize
GetTickCount
ReadFile
CreateFileW
LoadLibraryW
Sleep
lstrlenW
GetTempPathW
GetLocalTime
LocalAlloc
lstrcatW
LocalFree
CreateThread
OpenProcess
GetVersionExW
GetProcAddress
GetModuleHandleA
GetCurrentProcessId
ExitProcess
GetEnvironmentVariableW
lstrcmpA
lstrlenA
GetDriveTypeW
FindNextFileW
GetLogicalDriveStringsW
WaitForSingleObject
GetConsoleWindow
GetModuleFileNameW
lstrcatA
lstrcmpW
GetLastError
ReleaseMutex
GetTempPathA
DeleteFileA
lstrcpyA
CompareStringW
FlushFileBuffers
WriteConsoleW
SetStdHandle
RtlUnwind
HeapReAlloc
GetConsoleMode
GetConsoleCP
SetFilePointer
FindClose
MultiByteToWideChar
WideCharToMultiByte
WriteFile
FindFirstFileW
CreateFileA
GetModuleFileNameA
GetModuleHandleW
CreateProcessW
GetStringTypeW
LCMapStringW
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetExitCodeProcess
CreatePipe
GetStartupInfoW
SetEnvironmentVariableA
GetFileType
SetHandleCount
GetFileAttributesA
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
HeapCreate
GetStdHandle
LeaveCriticalSection
EnterCriticalSection
HeapSize
IsProcessorFeaturePresent
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
EncodePointer
DecodePointer
HeapAlloc
GetSystemTimeAsFileTime
HeapFree
CreateProcessA
DuplicateHandle
GetCurrentProcess
GetCommandLineA
HeapSetInformation
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetCPInfo
InterlockedIncrement
InterlockedDecrement
user32
ToUnicodeEx
DefWindowProcW
UpdateWindow
CreateWindowExW
ShowWindow
GetDesktopWindow
MapVirtualKeyExW
LoadIconW
wsprintfW
LoadCursorW
GetWindowDC
GetWindowRect
gdi32
DeleteDC
CreateDIBSection
GetDeviceCaps
DeleteObject
SelectObject
CreateCompatibleDC
SaveDC
RestoreDC
BitBlt
wininet
InternetOpenW
InternetConnectA
InternetOpenUrlW
InternetReadFile
HttpOpenRequestA
InternetGetConnectedState
InternetCheckConnectionA
HttpSendRequestA
InternetOpenA
InternetCloseHandle
ws2_32
gethostbyname
gethostname
send
closesocket
socket
recv
setsockopt
htons
inet_addr
connect
inet_ntoa
gdiplus
GdipFree
GdipAlloc
GdipGetImageEncodersSize
GdipDisposeImage
GdipCreateBitmapFromHBITMAP
GdipGetImageEncoders
GdipSaveImageToFile
GdipCloneImage
GdiplusStartup
GdiplusShutdown
shlwapi
StrStrIA
Sections
.text Size: 87KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE