Static task
static1
Behavioral task
behavioral1
Sample
ad86dd8112ac9d65f468833046309f1a2827726dd2f970ab8d37ba55472bb54b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ad86dd8112ac9d65f468833046309f1a2827726dd2f970ab8d37ba55472bb54b.exe
Resource
win10v2004-20220901-en
General
-
Target
ad86dd8112ac9d65f468833046309f1a2827726dd2f970ab8d37ba55472bb54b
-
Size
832KB
-
MD5
5fecb6a4e8a69ee0eb7ffda9338b0cfc
-
SHA1
51e183ebc6dbe880fc36153dde265a24adb257ed
-
SHA256
ad86dd8112ac9d65f468833046309f1a2827726dd2f970ab8d37ba55472bb54b
-
SHA512
fbe0cb4c12fb9b6fa0e7e210da5991a508da8f688f965e5f1a4052bbe3a903115608b07c6e278f006d8fb8043af011a9e04ec528b27f06905176cff873a0dd6d
-
SSDEEP
12288:Ur2v+ORx9KkFfRdG4gdhDknc7RFmEl3Xci61waFnozfhsSiKXO:I2v+KFf/GRhQnel3s31mRiKXO
Malware Config
Signatures
Files
-
ad86dd8112ac9d65f468833046309f1a2827726dd2f970ab8d37ba55472bb54b.exe windows x86
5cf84fb3eae8d6331e80fd5407f3e17c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
VirtualProtect
GetProcAddress
VirtualAlloc
GetCurrentThreadId
CloseHandle
WaitForSingleObject
DeleteCriticalSection
FreeLibrary
GetModuleFileNameW
GetTickCount
CreateEventA
SetEvent
Sleep
GetCurrentProcess
DeleteFileW
CreateEventW
CopyFileW
GetFullPathNameW
GetLastError
GetCurrentProcessId
LoadLibraryA
VirtualFree
SizeofResource
LoadResource
GetModuleHandleA
GetCommandLineW
FindResourceW
HeapFree
ReadFile
GetSystemTimeAsFileTime
GetCommandLineA
EncodePointer
DecodePointer
CreateThread
ExitThread
LoadLibraryExW
HeapAlloc
GetProcessHeap
IsDebuggerPresent
IsProcessorFeaturePresent
SetFilePointer
MultiByteToWideChar
GetConsoleMode
ReadConsoleW
SetFilePointerEx
GetStdHandle
GetFileType
InitializeCriticalSectionAndSpinCount
GetStartupInfoW
RtlUnwind
SetLastError
InterlockedIncrement
InterlockedDecrement
WriteFile
WideCharToMultiByte
GetConsoleCP
ExitProcess
GetModuleHandleExW
AreFileApisANSI
GetModuleFileNameA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
SetStdHandle
FlushFileBuffers
CreateFileW
WriteConsoleW
OutputDebugStringW
LoadLibraryW
HeapReAlloc
GetStringTypeW
LCMapStringW
SetEndOfFile
HeapSize
advapi32
AddAccessDeniedAce
CryptAcquireContextA
BuildExplicitAccessWithNameW
comctl32
ImageList_LoadImageA
ImageList_GetBkColor
ImageList_GetImageCount
Sections
.text Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 308KB - Virtual size: 317KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 400KB - Virtual size: 399KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ