?TLS@@YGXK@Z
Static task
static1
Behavioral task
behavioral1
Sample
f89ed311e87471da50cca909e55521fb72c3e7c8781076c3a0784e61129e1435.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f89ed311e87471da50cca909e55521fb72c3e7c8781076c3a0784e61129e1435.exe
Resource
win10v2004-20221111-en
General
-
Target
f89ed311e87471da50cca909e55521fb72c3e7c8781076c3a0784e61129e1435
-
Size
146KB
-
MD5
0980989b91f1b5f9dde06bfd2f9f97c0
-
SHA1
dd2de010b8ccdcac6783c865f8d2c2d646fee27a
-
SHA256
f89ed311e87471da50cca909e55521fb72c3e7c8781076c3a0784e61129e1435
-
SHA512
b39cac999cd27b21f2e8d97d0c0f6a66701b53b7f44a2ceee67358d1cd20aa8c764f53426cac0f53c536f266a791d2c5b27eb8d6d97df5fe78a90b1f86b05989
-
SSDEEP
3072:El6htJgl+mmlbn0JkmE0Ip2XiQoDlZ4V0cW/s9:EiJgEWJkV0IUeDl079
Malware Config
Signatures
Files
-
f89ed311e87471da50cca909e55521fb72c3e7c8781076c3a0784e61129e1435.exe windows x86
3615101c980db621abaa8a1abe6d2046
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathIsPrefixW
user32
GetParent
kernel32
ReadFile
RemoveDirectoryA
OpenFile
CreateMutexW
GetShortPathNameW
lstrcatA
SetCommState
AddAtomA
DeleteFileW
GetNumberFormatW
SetSystemTime
ConnectNamedPipe
GetCurrentDirectoryW
CreateEventA
MulDiv
SetFileTime
GlobalHandle
VerifyVersionInfoW
GetStartupInfoW
LoadLibraryA
GlobalLock
QueryDosDeviceW
GetComputerNameExW
GlobalReAlloc
CreateThread
WaitForSingleObjectEx
FlushFileBuffers
FreeResource
VirtualFree
GetLongPathNameW
CreateSemaphoreW
SystemTimeToFileTime
DeleteAtom
IsValidLocale
WinExec
ResumeThread
WideCharToMultiByte
FindCloseChangeNotification
lstrlenW
GetUserDefaultLCID
CreateFileMappingA
DefineDosDeviceW
InitializeCriticalSection
GetCurrentThread
GlobalFlags
CompareFileTime
GetModuleFileNameA
CreateEventW
HeapUnlock
GetCommState
HeapSize
GetOverlappedResult
GetTempFileNameA
VirtualProtect
FindFirstChangeNotificationW
FoldStringW
ConvertDefaultLocale
SetPriorityClass
SetCommTimeouts
SearchPathW
CopyFileW
GlobalMemoryStatus
GetSystemWindowsDirectoryA
GetDriveTypeA
SetCommMask
GetThreadTimes
GetCommTimeouts
GetPriorityClass
GetSystemTime
MoveFileExW
lstrcpynA
EnumResourceNamesW
MoveFileA
GetThreadPriority
GetCommProperties
GlobalAddAtomA
TlsGetValue
GetSystemDefaultUILanguage
CreateFileA
GetComputerNameExA
GetCommandLineW
CancelIo
SetThreadContext
EscapeCommFunction
SetHandleInformation
GetSystemDirectoryA
IsBadReadPtr
SetNamedPipeHandleState
TryEnterCriticalSection
SetupComm
RemoveDirectoryW
GetFileAttributesExA
GetModuleFileNameW
GetFileAttributesA
OpenSemaphoreW
IsBadCodePtr
lstrcatW
QueryPerformanceCounter
CreateWaitableTimerA
GetTempPathA
TransactNamedPipe
GetOEMCP
Exports
Exports
Sections
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gdata Size: 1024B - Virtual size: 781B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 558B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ