Static task
static1
Behavioral task
behavioral1
Sample
c45da1531e880623db4fe70966467340c06684f8a158261356a03d71940f7112.exe
Resource
win10v2004-20220812-en
General
-
Target
c45da1531e880623db4fe70966467340c06684f8a158261356a03d71940f7112
-
Size
317KB
-
MD5
adbce934c8b752f075a7a2f447302e80
-
SHA1
4defc527f5de2efb34acca9c4450b34318ab54b3
-
SHA256
c45da1531e880623db4fe70966467340c06684f8a158261356a03d71940f7112
-
SHA512
5f876400dc56941ad534fcaabbcb65a10e8298636fc2af1763d9205e196752022074e10d1c52a906c2a72c5e5a3127ea793694b36ed8c35ddbf376348c0cb860
-
SSDEEP
6144:nIA6gWEkDowweOE8otmUaA5NEE2LAUkHhSfbr5:nNfkDowV8ookNEE2LABH0fbr
Malware Config
Signatures
Files
-
c45da1531e880623db4fe70966467340c06684f8a158261356a03d71940f7112.exe windows x86
c709df806f7ef0077b3ea0d812494b1c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFirmwareEnvironmentVariableA
GetUserDefaultLCID
GetModuleHandleW
GetConsoleAliasesA
SetCommState
GetVolumePathNameW
GlobalAlloc
SetFileShortNameW
LoadLibraryW
LeaveCriticalSection
GetFileAttributesA
EnumSystemCodePagesA
GetNamedPipeInfo
GetFileAttributesW
WriteConsoleW
CreateJobObjectA
LCMapStringA
GetConsoleAliasesW
FillConsoleOutputCharacterW
GetLastError
WaitNamedPipeA
ReadConsoleOutputCharacterA
GetProcAddress
VirtualAlloc
CreateNamedPipeA
CopyFileA
CreateHardLinkW
GetNumberFormatW
SetProcessWorkingSetSize
OpenJobObjectW
FoldStringA
GetModuleHandleA
FindFirstChangeNotificationA
GetFileAttributesExW
GetCPInfoExA
GetVolumeNameForVolumeMountPointW
AddConsoleAliasA
GetFullPathNameA
FillConsoleOutputCharacterA
SetLastError
GetComputerNameA
HeapAlloc
GetCommandLineA
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DeleteCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
HeapReAlloc
HeapCreate
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
HeapSize
RtlUnwind
SetHandleCount
GetFileType
SetFilePointer
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RaiseException
InitializeCriticalSectionAndSpinCount
LoadLibraryA
CloseHandle
CreateFileA
GetConsoleCP
GetConsoleMode
SetStdHandle
FlushFileBuffers
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetEndOfFile
GetProcessHeap
ReadFile
WriteConsoleA
GetConsoleOutputCP
gdi32
GetCharacterPlacementW
advapi32
CreateRestrictedToken
ole32
CoRevokeMallocSpy
Sections
.text Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 138KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 94KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ