Behavioral task
behavioral1
Sample
e256734149f50559de400f53b2ae511de763917160062838ed3d8c27d348eba4.exe
Resource
win7-20220812-en
General
-
Target
e256734149f50559de400f53b2ae511de763917160062838ed3d8c27d348eba4
-
Size
5.7MB
-
MD5
dc5b343afeb76ffe522118cd728355c0
-
SHA1
aa95e1d919b58391d382fe7f0fa12c438b9d3279
-
SHA256
e256734149f50559de400f53b2ae511de763917160062838ed3d8c27d348eba4
-
SHA512
63b5915b52dc1fff37bf5f4507f48cc3f8a40f8e2063988975e5533b18c7ac86efbbd1454c18ecb51f71d7def3304818104ea9dd06f01ab46e1ca2e48e603bfb
-
SSDEEP
98304:XMrJBKZKD0ZO88+sT2h8hK1xUFe8uzfk+2Vcd4uobY:QKj3sTQ1D8uzfKMobY
Malware Config
Signatures
-
Darkcomet family
Files
-
e256734149f50559de400f53b2ae511de763917160062838ed3d8c27d348eba4.exe windows x86
2a23b322f4a5d4d7ef2a2b48495acd72
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
GetProcessHeap
HeapFree
GetProcAddress
GetModuleHandleW
GetTickCount
GetModuleFileNameW
SetEnvironmentVariableW
IsWow64Process
GetCurrentProcess
OpenProcess
GetLastError
DuplicateHandle
GetCommandLineW
OpenFileMappingW
MapViewOfFile
SetEvent
UnmapViewOfFile
CloseHandle
GetCommandLineA
CreateFileW
CreateFileMappingW
GetFileSizeEx
VirtualAlloc
VirtualFree
LoadLibraryW
ExitProcess
GetModuleHandleA
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xcpad Size: - Virtual size: 700KB
.idata Size: 1024B - Virtual size: 876B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 584B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ