Static task
static1
Behavioral task
behavioral1
Sample
f46717d9eb9ff46374348ba8b83250db47c692a8fa5d66cf3e90a58444a4d164.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f46717d9eb9ff46374348ba8b83250db47c692a8fa5d66cf3e90a58444a4d164.exe
Resource
win10v2004-20220812-en
General
-
Target
f46717d9eb9ff46374348ba8b83250db47c692a8fa5d66cf3e90a58444a4d164
-
Size
1.4MB
-
MD5
33f21f140115075da081abda7fed424c
-
SHA1
13d0116779fd3171efa1a67bdacffcf76bdb6015
-
SHA256
f46717d9eb9ff46374348ba8b83250db47c692a8fa5d66cf3e90a58444a4d164
-
SHA512
326fad61c6d4aa906e5de1867f0920bebb6b0a9a1b6621e9712b03d58083edac55b23ad364a69cf927272a5972c86120a4b792b1c0e670fa710e6bbabd0f5502
-
SSDEEP
24576:eTz0b28UQiG3YUySCg1i6jLekjFRtbtpkZasEO1r+L:E8UQi2Qg1JekZRPpk8sB1r4
Malware Config
Signatures
Files
-
f46717d9eb9ff46374348ba8b83250db47c692a8fa5d66cf3e90a58444a4d164.exe windows x86
3ada9a5a52e1bc8b95e4007ae2908f1a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
GetProcessHeap
GetCommandLineA
GetConsoleCP
GetSystemDirectoryW
GetModuleFileNameW
GetSystemDirectoryA
lstrlenW
FlushInstructionCache
OpenMutexW
GetLastError
GetCurrentDirectoryW
GetProcAddress
OpenMutexA
GetModuleFileNameA
GetModuleHandleA
IsDebuggerPresent
OutputDebugStringA
GetDiskFreeSpaceExW
OutputDebugStringW
GetVersion
GetTempPathA
GetSystemTime
HeapSize
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LoadLibraryA
GetComputerNameW
GetCurrentProcess
GetCPInfo
GetComputerNameA
GetWindowsDirectoryW
GetCommandLineW
HeapAlloc
GetStartupInfoW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
Sleep
ExitProcess
WriteFile
GetStdHandle
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
SetUnhandledExceptionFilter
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
TerminateProcess
UnhandledExceptionFilter
RtlUnwind
user32
GetWindowTextLengthW
GetWindowRect
IsIconic
IsZoomed
LoadBitmapA
LoadCursorW
GetForegroundWindow
GetWindowLongW
GetWindowTextW
IsWindowUnicode
GetDesktopWindow
GetCursorPos
GetCursor
IsWindowVisible
LoadCursorA
GetProcessDefaultLayout
advapi32
RegOpenKeyExW
RegOpenKeyExA
GetUserNameW
GetCurrentHwProfileA
GetUserNameA
Sections
Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 124B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1.3MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ