Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
318KB
-
MD5
5750e004486b8827dbe3719dfa939521
-
SHA1
8666ba4feff1cde48bfe37ca2d5cb748403f3301
-
SHA256
2bb879595ffe859f4a822bea116f56fd60e7fb1b515b79bbeacf8e035ea0551d
-
SHA512
f5bec6704521d1252de5d0f6da8236ef3e4ef605eb9cad22d5d4cf4ec67248378d921da5b1a2e11b2243b83e3350a13cdbddc914c37e1037dfb1503550b88b10
-
SSDEEP
6144:h33vd2LBC540o0rbmnNH7lD5hzsMO1s11hYZUkHhSfbr5:hP0LBC1oOb4BfsVWhYZBH0fbr
Malware Config
Signatures
Files
-
file.exe.exe windows x86
c709df806f7ef0077b3ea0d812494b1c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFirmwareEnvironmentVariableA
GetUserDefaultLCID
GetModuleHandleW
GetConsoleAliasesA
SetCommState
GetVolumePathNameW
GlobalAlloc
SetFileShortNameW
LoadLibraryW
LeaveCriticalSection
GetFileAttributesA
EnumSystemCodePagesA
GetNamedPipeInfo
GetFileAttributesW
WriteConsoleW
CreateJobObjectA
LCMapStringA
GetConsoleAliasesW
FillConsoleOutputCharacterW
GetLastError
WaitNamedPipeA
ReadConsoleOutputCharacterA
GetProcAddress
VirtualAlloc
CreateNamedPipeA
CopyFileA
CreateHardLinkW
GetNumberFormatW
SetProcessWorkingSetSize
OpenJobObjectW
FoldStringA
GetModuleHandleA
FindFirstChangeNotificationA
GetFileAttributesExW
GetCPInfoExA
GetVolumeNameForVolumeMountPointW
AddConsoleAliasA
GetFullPathNameA
FillConsoleOutputCharacterA
SetLastError
GetComputerNameA
HeapAlloc
GetCommandLineA
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DeleteCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
HeapReAlloc
HeapCreate
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
HeapSize
RtlUnwind
SetHandleCount
GetFileType
SetFilePointer
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RaiseException
InitializeCriticalSectionAndSpinCount
LoadLibraryA
CloseHandle
CreateFileA
GetConsoleCP
GetConsoleMode
SetStdHandle
FlushFileBuffers
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetEndOfFile
GetProcessHeap
ReadFile
WriteConsoleA
GetConsoleOutputCP
gdi32
GetCharacterPlacementW
advapi32
CreateRestrictedToken
ole32
CoRevokeMallocSpy
Sections
.text Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 139KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 94KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ