Static task
static1
Behavioral task
behavioral1
Sample
083ad08f45309bfaa9c3acc0e4059ea22acfb0dfc7274b1fb09dcda7ffb4fcae.exe
Resource
win10v2004-20220812-en
General
-
Target
083ad08f45309bfaa9c3acc0e4059ea22acfb0dfc7274b1fb09dcda7ffb4fcae
-
Size
1.9MB
-
MD5
38fa8502f83ab48fd7de2e9ebfac65be
-
SHA1
42b9e76e6895740b576a749f0fd2eee91dcef83f
-
SHA256
083ad08f45309bfaa9c3acc0e4059ea22acfb0dfc7274b1fb09dcda7ffb4fcae
-
SHA512
7cbb710e854b9f0781582bb3f802b6f24eb8d2aa1fb36f1c0d8540f00ada4904a53520be96634b0ace882831b3a9081bb901cdb27e4b67c760c883d48e990c71
-
SSDEEP
49152:h54hFcwNeJM01aHZTdGL/eCJpLK6dc3JjfhtHX3qTn6y:T4LzNeqmiTdyeMx2ZnXaTnF
Malware Config
Signatures
Files
-
083ad08f45309bfaa9c3acc0e4059ea22acfb0dfc7274b1fb09dcda7ffb4fcae.exe windows x86
4385a52c4954ea622602f131b43369ce
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemDefaultLangID
ExitProcess
GetCommandLineW
lstrcmpA
TlsGetValue
GetSystemDefaultUILanguage
HeapAlloc
GetCurrentProcess
GetEnvironmentStringsW
IsBadReadPtr
GetDllDirectoryW
GetUserDefaultLangID
GetConsoleCP
Sleep
GetProcessHandleCount
HeapCreate
GetLastError
SetLastError
IsValidCodePage
GetOEMCP
GetStringTypeW
DeleteFileW
GetCurrentProcessId
AreFileApisANSI
CreateFileW
WriteConsoleW
FlushFileBuffers
LCMapStringEx
SetThreadStackGuarantee
GetSystemInfo
VirtualAlloc
VirtualProtect
VirtualQuery
EncodePointer
DecodePointer
ReadFile
GetSystemTimeAsFileTime
RaiseException
RtlUnwind
IsDebuggerPresent
IsProcessorFeaturePresent
InterlockedDecrement
GetModuleHandleExW
GetProcAddress
MultiByteToWideChar
GetStdHandle
WriteFile
GetModuleFileNameW
GetProcessHeap
EnterCriticalSection
LeaveCriticalSection
GetFileType
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
InitOnceExecuteOnce
GetStartupInfoW
HeapSize
GetConsoleMode
ReadConsoleW
HeapFree
SetFilePointer
SetFilePointerEx
CloseHandle
InterlockedIncrement
GetCurrentThreadId
QueryPerformanceCounter
GetTickCount64
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
TerminateProcess
GetModuleHandleW
LoadLibraryExW
GetACP
GetCPInfo
OutputDebugStringW
LoadLibraryW
WideCharToMultiByte
HeapReAlloc
SetStdHandle
SetEndOfFile
user32
MessageBoxW
wsprintfW
GetForegroundWindow
GetSysColor
GetSysColorBrush
GetActiveWindow
ole32
CoGetCurrentProcess
Sections
U]_%FKv` Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
+hS^"?jD Size: 4KB - Virtual size: 66.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
s52J(jp% Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
FRFC'vl( Size: 175KB - Virtual size: 174KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ