Static task
static1
Behavioral task
behavioral1
Sample
4316505b7ac2e91600c2f6a2653aba80.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4316505b7ac2e91600c2f6a2653aba80.exe
Resource
win10v2004-20221111-en
General
-
Target
4316505b7ac2e91600c2f6a2653aba80.exe
-
Size
310KB
-
MD5
4316505b7ac2e91600c2f6a2653aba80
-
SHA1
d21a8fc6380e86cc92b597cce2ea88decc306a15
-
SHA256
b20c25cdce18b7304cf7c8da98bbd8355524ca812bff222613760c0fb768cd54
-
SHA512
3f309dba87879cbb64bb0bd0f8697df360f008a833d9d512d564c70482eb76165555c0eb9b33c101360e54ce7b52ec106c673b0c6f12a1e70a6f10581a3f7637
-
SSDEEP
6144:QDLvdC48H3mNEp/AdxEe1M5fL56+VFvg4/FQF:kbdnw3mNf83Y+DgSm
Malware Config
Signatures
Files
-
4316505b7ac2e91600c2f6a2653aba80.exe.exe windows x86
53d8260c8f234de2972d8d79feec3d9b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameA
FillConsoleOutputCharacterA
GetSystemDefaultLCID
GetModuleHandleW
GetConsoleAliasesA
WaitNamedPipeW
SetCommState
GetVolumePathNameW
SetFileShortNameW
LoadLibraryW
LeaveCriticalSection
GetFileAttributesA
GetNamedPipeInfo
GetFileAttributesW
WriteConsoleW
CreateJobObjectA
LCMapStringA
GetCPInfoExW
FillConsoleOutputCharacterW
GetLastError
SetLastError
GetVolumeNameForVolumeMountPointA
GetProcAddress
VirtualAlloc
SetFirmwareEnvironmentVariableW
CreateNamedPipeA
CopyFileA
EnumSystemCodePagesW
LoadLibraryA
WriteConsoleA
GetProcessWorkingSetSize
LocalAlloc
CreateHardLinkW
GetNumberFormatW
FindNextChangeNotification
OpenJobObjectW
FoldStringW
GetModuleHandleA
GetFileAttributesExW
AddConsoleAliasA
ReadConsoleOutputCharacterA
GetFullPathNameW
HeapAlloc
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
DeleteCriticalSection
EnterCriticalSection
VirtualFree
HeapReAlloc
HeapCreate
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
HeapSize
RtlUnwind
SetHandleCount
GetFileType
GetStartupInfoA
SetFilePointer
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
CloseHandle
CreateFileA
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
SetStdHandle
FlushFileBuffers
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
RaiseException
SetEndOfFile
GetProcessHeap
ReadFile
GetConsoleOutputCP
advapi32
CreateRestrictedToken
Sections
.text Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 139KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 87KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ