Static task
static1
Behavioral task
behavioral1
Sample
5bcaaf0a735d987ec5ee934356807346108e0432ccc74e23a338b2818e2b9271.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5bcaaf0a735d987ec5ee934356807346108e0432ccc74e23a338b2818e2b9271.exe
Resource
win10v2004-20220901-en
General
-
Target
5bcaaf0a735d987ec5ee934356807346108e0432ccc74e23a338b2818e2b9271
-
Size
759KB
-
MD5
348e03b8836af726faa95e408f457a20
-
SHA1
b25f63d6f29d7373f6171070be2c9a56dfbcc23e
-
SHA256
5bcaaf0a735d987ec5ee934356807346108e0432ccc74e23a338b2818e2b9271
-
SHA512
91782b31276881cd650d690860dfca2495ae611c697d22e79fd5dfb772d142eb2866a799648e0675b79a2d89ca5bf5a8810b740014389b4cff6da80b376c92c6
-
SSDEEP
12288:vokbHJNIYjF/80dygyAhvd/ENEEgcLl2lPNmVk5gD1vY5C7bkyo/Apbvo7cW1p9f:vFFNIYjF80cA1EXlQzCDpfUAet10s95
Malware Config
Signatures
Files
-
5bcaaf0a735d987ec5ee934356807346108e0432ccc74e23a338b2818e2b9271.exe windows x86
eb28594717851a9918ee960b3f36c923
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryW
GetModuleHandleW
FreeLibrary
GetProcAddress
GetTickCount
GetThreadLocale
ReadFile
CloseHandle
WaitForSingleObject
SetHandleInformation
CreatePipe
CreateDirectoryW
GetSystemWindowsDirectoryW
FindClose
FindFirstFileW
GetModuleFileNameW
InterlockedIncrement
GlobalMemoryStatusEx
GetVersionExW
GetCurrentProcess
GetNativeSystemInfo
GetLastError
CreateFileW
GetSystemDirectoryW
CreateProcessW
lstrlenW
LocalAlloc
FormatMessageW
GetLongPathNameW
GetShortPathNameW
InterlockedDecrement
GetWindowsDirectoryW
OutputDebugStringW
GetCurrentProcessId
GetCurrentThreadId
GetModuleHandleExW
lstrlenA
GetExitCodeProcess
WriteConsoleW
FlushFileBuffers
HeapSize
CompareStringW
LCMapStringW
QueryPerformanceCounter
GetProcessHeap
SetEndOfFile
SetFilePointer
GetFileAttributesW
SetStdHandle
GetConsoleMode
GetConsoleCP
SetHandleCount
Sleep
SetEnvironmentVariableW
SetEnvironmentVariableA
IsProcessorFeaturePresent
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStdHandle
WriteFile
LocalFree
InterlockedExchange
LoadLibraryA
RaiseException
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeW
FindFirstFileExW
WideCharToMultiByte
GetSystemTimeAsFileTime
HeapFree
HeapReAlloc
HeapAlloc
GetStringTypeW
ExitProcess
DecodePointer
MultiByteToWideChar
RtlUnwind
EnterCriticalSection
LeaveCriticalSection
DeleteFileW
GetFileType
GetTimeFormatW
GetDateFormatW
GetTimeZoneInformation
GetCommandLineW
HeapSetInformation
GetStartupInfoW
GetFullPathNameW
GetFileInformationByHandle
PeekNamedPipe
GetCurrentDirectoryW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
HeapCreate
user32
LoadCursorW
DefWindowProcW
DispatchMessageW
TranslateMessage
GetMessageW
SetTimer
CreateWindowExW
RegisterClassW
wsprintfW
MessageBoxW
ole32
StringFromCLSID
CoTaskMemFree
oleaut32
SysFreeString
VariantClear
SysAllocString
SysStringLen
SysAllocStringByteLen
wsock32
closesocket
WSAAsyncSelect
connect
htons
getsockname
ioctlsocket
socket
bind
recv
accept
ntohs
listen
WSAStartup
send
WSAGetLastError
Sections
.text Size: 151KB - Virtual size: 151KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vmp0 Size: 508KB - Virtual size: 1.6MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE