Static task
static1
Behavioral task
behavioral1
Sample
805eb65227383fc406fa7372939a37ad9aa060c755a1d38de21d59d13a0d95c6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
805eb65227383fc406fa7372939a37ad9aa060c755a1d38de21d59d13a0d95c6.exe
Resource
win10v2004-20221111-en
General
-
Target
805eb65227383fc406fa7372939a37ad9aa060c755a1d38de21d59d13a0d95c6
-
Size
122KB
-
MD5
e4349530ee4b56374b9804963f468153
-
SHA1
3fcdac5e4ad7922d0e873977a8ad38a4697ef1df
-
SHA256
805eb65227383fc406fa7372939a37ad9aa060c755a1d38de21d59d13a0d95c6
-
SHA512
9fb5aa6dc1545621dc2fc61052b9f8791f8147fbdce90e9057a253dbab42832a6b27ab15310e09b9dd083f7c6dbce59519f6d9b5642135bf4f2a6ad49a1f82ee
-
SSDEEP
1536:0ZhgyKBh9HfvC66TRpI0A3wPcwXcRueyPxa9y+vjbe3fMa4rbwIyKmVfB4nTEo+m:HychVg7DPPiy+vuP/qUIyKkfBRbg
Malware Config
Signatures
Files
-
805eb65227383fc406fa7372939a37ad9aa060c755a1d38de21d59d13a0d95c6.exe windows x86
4fdb1ae823ab4db0e22308333ee908ad
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EraseTape
GetProcessIoCounters
TlsGetValue
FindFirstFileExW
CreateJobSet
GetProcessTimes
MulDiv
ResetEvent
GetNamedPipeHandleStateA
LockResource
LocalShrink
UnlockFileEx
GetWriteWatch
SetSystemTimeAdjustment
QueryMemoryResourceNotification
AssignProcessToJobObject
GetProcessHeap
CreateFiberEx
ReplaceFileW
FlushInstructionCache
CreateMemoryResourceNotification
GetModuleFileNameA
ReleaseSemaphore
GetCommandLineW
GetNamedPipeInfo
IsWow64Process
GetThreadPriority
GetFileTime
SetFilePointerEx
GetFileInformationByHandle
ReplaceFileA
TlsSetValue
GetPriorityClass
DecodePointer
GetProcessAffinityMask
InitAtomTable
GetThreadContext
GetThreadSelectorEntry
SetLastError
FreeResource
GlobalCompact
LocalUnlock
GetVersion
SetSystemPowerState
SetHandleCount
CreateIoCompletionPort
SetProcessPriorityBoost
FlushViewOfFile
GlobalUnWire
ClearCommBreak
GetAtomNameW
GetExitCodeThread
CreateFiber
GetProcessId
GetFileSizeEx
PulseEvent
FindVolumeClose
GetHandleInformation
LockFile
FindNextChangeNotification
SetMessageWaitingIndicator
GetTapeParameters
SetProcessWorkingSetSize
SetMailslotInfo
DeleteAtom
GetFileType
CheckRemoteDebuggerPresent
GetCommModemStatus
WTSGetActiveConsoleSessionId
SetInformationJobObject
TransmitCommChar
DisconnectNamedPipe
GetCurrentProcess
GlobalDeleteAtom
ResetWriteWatch
SetProcessShutdownParameters
CreateFileMappingW
FindCloseChangeNotification
GetThreadTimes
OpenProcess
GetFileAttributesExW
GetCommTimeouts
DisableThreadLibraryCalls
ConvertThreadToFiber
GetNamedPipeHandleStateW
GetCurrentThreadId
SetStdHandle
ReleaseMutex
QueueUserAPC
SetTapeParameters
PrepareTape
RequestWakeupLatency
SetCommState
GetStdHandle
GetCurrentThread
PeekNamedPipe
GetProcessHandleCount
GetThreadPriorityBoost
EnterCriticalSection
LeaveCriticalSection
GetCommandLineA
GetStartupInfoA
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
GetProcAddress
TlsAlloc
TlsFree
GetLastError
LCMapStringW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
WideCharToMultiByte
DeleteCriticalSection
Sleep
HeapFree
ExitProcess
WriteFile
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
RtlUnwind
SetFilePointer
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
HeapAlloc
HeapReAlloc
VirtualAlloc
LoadLibraryA
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
HeapSize
CloseHandle
CreateFileA
Sections
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ