Static task
static1
Behavioral task
behavioral1
Sample
f4ac334f7fc1aa1a357d616e4fc0f2417df8e1b414bfc136b551f69e7ae95c48.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f4ac334f7fc1aa1a357d616e4fc0f2417df8e1b414bfc136b551f69e7ae95c48.exe
Resource
win10v2004-20220812-en
General
-
Target
f4ac334f7fc1aa1a357d616e4fc0f2417df8e1b414bfc136b551f69e7ae95c48
-
Size
4.3MB
-
MD5
c277068ec70fae29146520928c17b8bf
-
SHA1
690e6d6f12437185a5aacd80ca5460c81ab16179
-
SHA256
f4ac334f7fc1aa1a357d616e4fc0f2417df8e1b414bfc136b551f69e7ae95c48
-
SHA512
79d926537047dd5ac7465a9b9d6876c63b260ef5a6c1fd8b13898ea84527b4ffd443d8714ec441cd448cac9dc7dfd2fd90b38488c5d3ea60f2ddd0fcb450f586
-
SSDEEP
49152:GSuK4jZ0WHCpNqLmxup49dGKvghxfki1YCc7SK4jZ8hpTQdrr:t2Z0NvqHKcaz7SK4jZspsdr
Malware Config
Signatures
Files
-
f4ac334f7fc1aa1a357d616e4fc0f2417df8e1b414bfc136b551f69e7ae95c48.exe windows x86
39228d1d228f54cebd3bf9d13ef87302
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObjectEx
GetFileAttributesA
GetCurrentProcess
WideCharToMultiByte
MultiByteToWideChar
HeapAlloc
HeapFree
CreateMutexA
GetModuleHandleExW
Sleep
GetLastError
GetProcessHeap
InterlockedCompareExchange
SetLastError
GetVersionExA
GetModuleHandleA
HeapReAlloc
LeaveCriticalSection
DisableThreadLibraryCalls
CreateFileW
VirtualAlloc
VirtualFree
GetTempPathA
GetProcAddress
LoadLibraryA
RemoveDirectoryA
EnterCriticalSection
CloseHandle
GetCurrentThreadId
LocalFileTimeToFileTime
ReadFile
GetTickCount
ExitProcess
WriteConsoleW
GetConsoleCP
FlushFileBuffers
SetStdHandle
LoadLibraryW
OutputDebugStringW
LCMapStringW
LoadLibraryExW
GetModuleHandleW
TlsFree
TlsSetValue
SetEndOfFile
TlsGetValue
TlsAlloc
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
RtlUnwind
GetCommandLineA
InterlockedDecrement
AreFileApisANSI
HeapSize
IsDebuggerPresent
InterlockedIncrement
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
RaiseException
GetStdHandle
WriteFile
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
SetFilePointer
SetFilePointerEx
GetConsoleMode
ReadConsoleW
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetStringTypeW
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
advapi32
RegEnumKeyExW
RegEnumKeyW
RegCreateKeyExW
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegQueryValueExW
RegCreateKeyExA
RegOpenKeyW
RegEnumKeyExA
user32
GetWindowRect
CreateWindowExW
GetClientRect
GetWindowTextW
RegisterClassExA
RegisterWindowMessageA
SetWindowPos
PostQuitMessage
RegisterClassExW
PeekMessageA
MsgWaitForMultipleObjects
CreateWindowExA
RedrawWindow
SetForegroundWindow
PostMessageW
SendMessageA
DefWindowProcA
RegisterWindowMessageW
MessageBoxW
SendMessageW
TrackPopupMenu
ShowWindow
UpdateWindow
FindWindowW
GetParent
LoadIconW
PostMessageA
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2.9MB - Virtual size: 2.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 78KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ