Static task
static1
Behavioral task
behavioral1
Sample
714b98870691ecda1f075037bec06bab7de0e7271452719506e5ab9f909a078b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
714b98870691ecda1f075037bec06bab7de0e7271452719506e5ab9f909a078b.exe
Resource
win10v2004-20221111-en
General
-
Target
714b98870691ecda1f075037bec06bab7de0e7271452719506e5ab9f909a078b
-
Size
5.9MB
-
MD5
1f941d2162014f1c66ad0613f2bca352
-
SHA1
1b082e947c7ee1c05d9531fdab455890d402978c
-
SHA256
714b98870691ecda1f075037bec06bab7de0e7271452719506e5ab9f909a078b
-
SHA512
0c50f9b7822b3fe88d12e944c8eda682d7cbe408218cc3a243c9e23cf6fa0b7122f3a647a38edfb9d6fbc09cc510da57312e5d18d5a02025446a309381d42aa6
-
SSDEEP
98304:2RfPHS5YsWGHuJglrSikuGdPYiz3W42mE6ASCt2FoQVxb32i/AX7oLcmpBS:g/8YsjlxkuGKiDb2KCCoQ72i/7Ym/
Malware Config
Signatures
Files
-
714b98870691ecda1f075037bec06bab7de0e7271452719506e5ab9f909a078b.exe windows x86
ffde6642985ad5c6fd3cef1ecab8a3fe
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CloseHandle
GetCurrentProcess
InitializeCriticalSection
SystemTimeToFileTime
GetLastError
GetTickCount
GetProcAddress
InterlockedCompareExchange
SetLastError
CreateFileA
GetModuleHandleA
GetVersionExA
GetModuleHandleExW
Sleep
EnterCriticalSection
VirtualProtect
CreateFileW
CreateMutexA
LoadLibraryA
HeapFree
HeapAlloc
GetProcessHeap
DeleteCriticalSection
IsBadReadPtr
GetCurrentProcessId
VirtualFree
ReadFile
VirtualAlloc
WriteConsoleW
SetStdHandle
SetFilePointerEx
GetConsoleMode
GetConsoleCP
LCMapStringW
HeapReAlloc
LoadLibraryW
OutputDebugStringW
LoadLibraryExW
LeaveCriticalSection
GetModuleHandleW
TlsFree
TlsSetValue
TlsGetValue
FlushFileBuffers
TlsAlloc
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsW
IsProcessorFeaturePresent
RtlUnwind
GetCommandLineA
InterlockedDecrement
ExitProcess
MultiByteToWideChar
GetStdHandle
WriteFile
GetModuleFileNameW
HeapSize
RaiseException
IsDebuggerPresent
InterlockedIncrement
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetStringTypeW
GetCurrentThreadId
WideCharToMultiByte
GetFileType
InitializeCriticalSectionAndSpinCount
GetStartupInfoW
GetModuleFileNameA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStringsW
advapi32
RegQueryValueA
RegCreateKeyA
RegEnumKeyA
RegQueryInfoKeyW
RegCreateKeyExA
RegEnumKeyExA
RegQueryInfoKeyA
RegEnumKeyW
RegCreateKeyW
user32
GetLastInputInfo
UpdateWindow
SetWindowPos
RegisterWindowMessageW
LoadIconW
LoadIconA
FindWindowA
BringWindowToTop
TrackPopupMenu
DefWindowProcW
GetDlgItem
DispatchMessageA
RegisterWindowMessageA
PeekMessageA
RedrawWindow
CreateWindowExA
RegisterClassExA
PostQuitMessage
GetDesktopWindow
SendMessageA
SendMessageW
MsgWaitForMultipleObjects
GetWindowTextW
EnumWindows
MessageBoxW
RegisterClassExW
CheckMenuItem
SetForegroundWindow
GetMessageW
DispatchMessageW
Sections
.text Size: 440KB - Virtual size: 440KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 434KB - Virtual size: 434KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5.0MB - Virtual size: 5.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ