Static task
static1
Behavioral task
behavioral1
Sample
13421339f7ad76def0302d75897ae4d0e3d4d06545716285f9d0c48e02aca7be.exe
Resource
win10v2004-20220901-en
General
-
Target
13421339f7ad76def0302d75897ae4d0e3d4d06545716285f9d0c48e02aca7be
-
Size
1.2MB
-
MD5
0c43fe7786f9c0e4b726f72c758e3eed
-
SHA1
1746a8826c2f3cae77ff09eccbe93c14bdbfd2ce
-
SHA256
13421339f7ad76def0302d75897ae4d0e3d4d06545716285f9d0c48e02aca7be
-
SHA512
6a95b03f90e8fa6b3d375bde6105cfe0c62a780b9766868e173bd27a6cabb27f8b798295b0682015bd77706ac2eceb037eedcf263fc2110ba9be5b80921e6fd2
-
SSDEEP
12288:EYG8VmkZ6zCcrLaG8R8mSo/WDr1rHj5qq:E8VmC67HaMmSbDZ5
Malware Config
Signatures
Files
-
13421339f7ad76def0302d75897ae4d0e3d4d06545716285f9d0c48e02aca7be.exe windows x64
46077088cb076fb7dfb15b3d28826079
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
shlwapi
SHDeleteKeyA
PathFileExistsA
SHDeleteValueA
StrStrA
ntdll
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
NtQuerySystemInformation
RtlInitUnicodeString
RtlPcToFileHeader
RtlUnwindEx
RtlUnwind
kernel32
GetProcessHeap
DeviceIoControl
InitializeCriticalSectionEx
DeleteCriticalSection
GetCurrentThreadId
VirtualFree
GetTempPathW
GetTempPathA
ExitProcess
GlobalAlloc
LocalAlloc
CreateFileA
DeleteFileA
FindClose
FindFirstFileA
FindNextFileA
GetLogicalDrives
ReadFile
SetFileAttributesA
SetFilePointer
WriteFile
TerminateProcess
GetTickCount64
LocalFree
K32EnumDeviceDrivers
K32GetDeviceDriverBaseNameA
HeapSize
ReadConsoleW
SetFilePointerEx
GetFileSizeEx
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
WriteConsoleW
GetModuleFileNameW
GetFileType
GetStdHandle
HeapFree
HeapReAlloc
HeapAlloc
GetLastError
RaiseException
DecodePointer
CreateFileW
Process32Next
Process32First
Module32Next
Module32First
WriteProcessMemory
ReadProcessMemory
VirtualProtectEx
OpenProcess
VirtualAllocEx
GetModuleHandleA
CreateToolhelp32Snapshot
LoadLibraryA
GetProcAddress
VirtualAlloc
CreateThread
GetCurrentProcessId
GetCurrentProcess
Sleep
CloseHandle
GetExitCodeProcess
CreateProcessW
GetFileAttributesExW
WaitForSingleObject
GetEnvironmentStringsW
FreeLibraryAndExitThread
ResumeThread
ExitThread
DeleteFileW
GetModuleHandleExW
LoadLibraryExW
SetEndOfFile
SetEnvironmentVariableW
FreeEnvironmentStringsW
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetLastError
OutputDebugStringW
InitializeSListHead
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
CreateEventW
ResetEvent
SetEvent
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
SetStdHandle
QueryPerformanceCounter
QueryPerformanceFrequency
WaitForSingleObjectEx
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
EnterCriticalSection
LeaveCriticalSection
EncodePointer
MultiByteToWideChar
WideCharToMultiByte
LCMapStringEx
GetStringTypeW
user32
PostQuitMessage
SendMessageA
MessageBoxA
EnableWindow
ShowWindow
GetDC
GetWindowRect
IsDialogMessageA
LoadCursorA
LoadBitmapA
GetClassNameA
EnumWindows
GetWindowTextA
UpdateWindow
IsDlgButtonChecked
CheckDlgButton
CreateWindowExA
RegisterClassA
DefWindowProcA
DispatchMessageA
TranslateMessage
GetMessageA
SetWindowTextA
PostMessageA
GetDesktopWindow
gdi32
SetTextColor
SetBkMode
SetDCBrushColor
SetBkColor
GetStockObject
CreateSolidBrush
CreatePatternBrush
CreateFontA
SetBrushOrgEx
GetObjectA
SetStretchBltMode
SelectObject
GetDIBits
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
advapi32
SetNamedSecurityInfoA
SetEntriesInAclA
RegCopyTreeA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyExA
RegCreateKeyExA
RegCreateKeyA
LookupPrivilegeValueA
FreeSid
AllocateAndInitializeSid
AdjustTokenPrivileges
RegSetKeyValueW
RegOpenKeyW
RegDeleteKeyW
RegCreateKeyW
RegCloseKey
GetTokenInformation
OpenProcessToken
shell32
SHGetFolderPathA
SHFileOperationA
ShellExecuteA
ole32
CoInitializeSecurity
CoInitializeEx
CoCreateInstance
CoSetProxyBlanket
CoUninitialize
oleaut32
SysFreeString
SysAllocString
VariantClear
ws2_32
closesocket
connect
htons
inet_addr
inet_ntoa
send
socket
gethostbyname
WSAStartup
WSACleanup
ioctlsocket
setsockopt
getaddrinfo
freeaddrinfo
recv
urlmon
URLDownloadToFileA
Sections
.text Size: 358KB - Virtual size: 358KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 148KB - Virtual size: 147KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 724KB - Virtual size: 723KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ