Static task
static1
Behavioral task
behavioral1
Sample
f4d75f8add2ab5e53b63390214af3a5dd7a765fd818a283b2b02e812ce42f923.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f4d75f8add2ab5e53b63390214af3a5dd7a765fd818a283b2b02e812ce42f923.exe
Resource
win10v2004-20221111-en
General
-
Target
f4d75f8add2ab5e53b63390214af3a5dd7a765fd818a283b2b02e812ce42f923
-
Size
452KB
-
MD5
aeb11327e00e0d5c9cd1d1b022945215
-
SHA1
ef26e0a1817aa35e9d7ad994bfa9f5fa2d9b7f81
-
SHA256
f4d75f8add2ab5e53b63390214af3a5dd7a765fd818a283b2b02e812ce42f923
-
SHA512
cc97bad23d68000c1f4f933233f72707849dc71bb03330be6a87fec013d1699934e15ac6ece69c5f5026688436f954de1aebc615e6bf520f31a5e891adfc7fb6
-
SSDEEP
6144:pSp/dA5j9V2/948UBH+fcCdWO3R6WNLrkdSAhY1rAlNRehKs1qE:pRZ9V2/94BeRdTBD5ASSlL+j1
Malware Config
Signatures
Files
-
f4d75f8add2ab5e53b63390214af3a5dd7a765fd818a283b2b02e812ce42f923.exe windows x86
245aedb5d3b0ceb387050db32758b707
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
xolehlp
DtcGetTransactionManagerExA
kernel32
DuplicateHandle
GetCurrentProcess
OpenProcess
GetProcessHeap
QueueUserAPC
GetProcessIdOfThread
OpenThread
HeapFree
GetCurrentThread
GetEnvironmentVariableA
CloseHandle
LoadLibraryA
GetProcAddress
CompareStringW
Sleep
GetACP
HeapValidate
IsBadReadPtr
RaiseException
GetCommandLineA
GetVersionExA
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
DebugBreak
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
DeleteCriticalSection
FatalAppExitA
GetModuleFileNameA
GetLastError
HeapReAlloc
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
InterlockedIncrement
InterlockedDecrement
GetModuleHandleA
ExitProcess
SetEnvironmentVariableA
GetOEMCP
GetCPInfo
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
WriteFile
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
SetConsoleCtrlHandler
LoadLibraryW
RtlUnwind
VirtualQuery
FreeLibrary
InitializeCriticalSection
InterlockedExchange
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetLocaleInfoA
IsValidLocale
IsValidCodePage
EnumSystemLocalesA
GetUserDefaultLCID
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointer
GetLocaleInfoW
GetTimeZoneInformation
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
CreateFileA
CompareStringA
advapi32
ImpersonateSelf
LookupAccountSidA
SetThreadToken
OpenThreadToken
DuplicateTokenEx
CreateProcessAsUserA
GetTokenInformation
GetUserNameA
Sections
.textbss Size: - Virtual size: 170KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 364KB - Virtual size: 361KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ