Static task
static1
Behavioral task
behavioral1
Sample
maspfupcxhbpflabebzeaqpzjdixq.exe
Resource
win10v2004-20221111-en
General
-
Target
maspfupcxhbpflabebzeaqpzjdixq.exe
-
Size
538KB
-
MD5
e4a2b254e41e0661ea040bacc152eae6
-
SHA1
afa603762ea8396abae8d995049abfe74ca1bcbc
-
SHA256
a06c00ff043911baa20163e2be8535d4f27a1852338d428754601e480c517657
-
SHA512
87f80323668b813380bb409db2e116d20911538b01fd32445c7f941a4fd942160ee430ea20c132752f72b8d337ec099f1d1c30433b5da15f3514570fe93e7a32
-
SSDEEP
12288:vXs2AeTVu+itICp2xtZ5MEW1Kh7IHqWyx2oGKH/rtSh:vXs2TotItl+1V02eHTt
Malware Config
Signatures
Files
-
maspfupcxhbpflabebzeaqpzjdixq.exe.exe windows x64
97135b78ceb8a9fae119c19333f96280
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
CreateFileA
CloseHandle
GetLastError
DeleteCriticalSection
ConvertThreadToFiber
CreateFiber
DeleteFiber
SwitchToFiber
CreateActCtxA
ActivateActCtx
DeactivateActCtx
CreateThread
SuspendThread
LockFile
UnlockFile
ExitProcess
VirtualAlloc
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
HeapAlloc
HeapFree
GetModuleHandleW
GetProcAddress
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
FreeLibrary
LoadLibraryExW
CompareStringW
LCMapStringW
GetStdHandle
GetFileType
GetStartupInfoW
MultiByteToWideChar
WideCharToMultiByte
GetCurrentThreadId
GetACP
GetStringTypeW
RaiseException
GetProcessHeap
FlushFileBuffers
WriteFile
GetConsoleCP
GetConsoleMode
SetStdHandle
GetCPInfo
IsValidCodePage
GetOEMCP
GetModuleHandleExW
SetFilePointerEx
WriteConsoleW
GetModuleFileNameW
CreateFileW
HeapSize
HeapReAlloc
QueryPerformanceCounter
GetCurrentProcessId
InitializeSListHead
RtlUnwindEx
FindClose
FindFirstFileExW
FindNextFileW
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
Sections
.text Size: 111KB - Virtual size: 111KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 300KB - Virtual size: 299KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 115KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 168B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ