Static task
static1
Behavioral task
behavioral1
Sample
d18f26c42d25d500bef6c4f0170dfb7cf24cad1188817ac82f811c6b41bb1611.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d18f26c42d25d500bef6c4f0170dfb7cf24cad1188817ac82f811c6b41bb1611.exe
Resource
win10v2004-20220812-en
General
-
Target
d18f26c42d25d500bef6c4f0170dfb7cf24cad1188817ac82f811c6b41bb1611
-
Size
1.2MB
-
MD5
f96142e802ff54b75267979889b16837
-
SHA1
9890a9a501d86199b744a73b8ec4a9706ce3296c
-
SHA256
d18f26c42d25d500bef6c4f0170dfb7cf24cad1188817ac82f811c6b41bb1611
-
SHA512
2dfd2865cd7da3d2aa118f3223a39014212bfeeb8c74536bb74cef3ecd8a65f8e9762012b4a05a286c8d33ae3a3bd7fcabaa979d3486a57ef65e7f62fbd6a522
-
SSDEEP
24576:R+oe64fN1hnV5LmUJfUahK54jenvJJPcmY4DIzI+Cx6hDr/a3oSq:IoEPhnaUJc2ynvJJPcv4DIzIJmDrmoX
Malware Config
Signatures
Files
-
d18f26c42d25d500bef6c4f0170dfb7cf24cad1188817ac82f811c6b41bb1611.exe windows x86
eb23bc43b82a7da29203c6f95970601d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStringTypeW
GetSystemDirectoryW
LoadLibraryW
GetModuleFileNameW
ReleaseMutex
OpenMutexW
CreateProcessW
OpenEventW
GetSystemPowerStatus
InitializeCriticalSectionAndSpinCount
RegisterWaitForSingleObject
UnregisterWait
WaitForSingleObject
SetEvent
OpenProcess
CreateEventW
MapViewOfFile
UnmapViewOfFile
UnregisterWaitEx
FreeLibrary
FileTimeToSystemTime
GetTimeZoneInformation
CompareStringW
InterlockedExchange
VirtualQuery
HeapCreate
SetEnvironmentVariableW
HeapAlloc
GetVersionExA
GetStartupInfoA
FindClose
FindFirstFileA
GetExitCodeThread
CreateProcessA
LocalFree
QueryPerformanceFrequency
GetFullPathNameA
GetCurrentDirectoryA
SetEndOfFile
WriteConsoleA
FlushFileBuffers
SetStdHandle
LoadLibraryA
SetFilePointer
HeapSize
GetLocaleInfoA
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
FreeEnvironmentStringsA
GetFileType
SetHandleCount
ExitProcess
GetConsoleMode
GetConsoleCP
HeapReAlloc
VirtualAlloc
VirtualFree
HeapDestroy
GetStdHandle
RaiseException
GetStringTypeA
LCMapStringW
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
GetACP
InterlockedDecrement
InterlockedIncrement
GetCPInfo
IsDebuggerPresent
UnhandledExceptionFilter
GetProcessHeap
GetCommandLineA
HeapFree
RtlUnwind
GetDriveTypeA
DeleteCriticalSection
lstrlenA
WideCharToMultiByte
MultiByteToWideChar
CloseHandle
CreateFileA
LeaveCriticalSection
EnterCriticalSection
GetProcAddress
InitializeCriticalSection
WriteFile
SetFilePointerEx
ReadFile
GetLastError
DeviceIoControl
GetVersion
GetSystemInfo
GetModuleHandleA
WriteConsoleW
SetEnvironmentVariableA
CreateFileW
IsProcessorFeaturePresent
GetEnvironmentStrings
Sleep
user32
EnumWindows
AllowSetForegroundWindow
SetForegroundWindow
GetWindowThreadProcessId
advapi32
RegOpenKeyExW
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
RegQueryValueExW
msvcrt
printf
winmm
timeEndPeriod
Sections
.text Size: 124KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 80KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 84KB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE