Static task
static1
Behavioral task
behavioral1
Sample
f32abfb85ffc5c0d3669d724b945c63550b9496373712e2f2fbaef206a9ceb55.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f32abfb85ffc5c0d3669d724b945c63550b9496373712e2f2fbaef206a9ceb55.exe
Resource
win10v2004-20220812-en
General
-
Target
f32abfb85ffc5c0d3669d724b945c63550b9496373712e2f2fbaef206a9ceb55
-
Size
220KB
-
MD5
14ef4243306a2758259611d3ea049d60
-
SHA1
199d56dd58ed9dd06ac5abb11bbfd96af6f22b7b
-
SHA256
f32abfb85ffc5c0d3669d724b945c63550b9496373712e2f2fbaef206a9ceb55
-
SHA512
6b6cfcd705253e2dfb233bba71282dd7003bb6ff216019f68412eead1efed54aaf412cc95c435a4a33f6b61c65435ba66d40ed782480524f175c9b9fdc54b31a
-
SSDEEP
3072:wlhkX5ZSZ6D02VmMBbz1xc6UzJskvt4eL+15NiWIwEPNX3XA:wvkXSZohNfezdn+15wPx3Q
Malware Config
Signatures
Files
-
f32abfb85ffc5c0d3669d724b945c63550b9496373712e2f2fbaef206a9ceb55.exe windows x86
2b3e2bb24952aa83310965ec0e564abf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DisconnectNamedPipe
GetProcessId
GlobalWire
_hwrite
FatalExit
DeleteTimerQueueTimer
GetLogicalDriveStringsA
GetExitCodeProcess
ReadConsoleOutputCharacterA
MapViewOfFileEx
SetHandleContext
GetVolumeNameForVolumeMountPointA
GetConsoleCursorInfo
ReadConsoleInputA
GetProcessVersion
GetCurrentDirectoryA
GetConsoleSelectionInfo
SleepEx
GetVersionExA
VirtualAlloc
ReadConsoleOutputA
GetSystemDirectoryA
CreateSemaphoreA
SetConsoleCursor
GetSystemWindowsDirectoryA
SetConsoleWindowInfo
SetHandleInformation
FillConsoleOutputCharacterA
GetDefaultCommConfigA
EnumSystemLocalesA
HeapUnlock
ReadConsoleA
GetTempPathA
GetProcessAffinityMask
ResetEvent
IsValidLanguageGroup
Heap32ListNext
GetEnvironmentStringsA
ResumeThread
GetCurrentThread
WriteProcessMemory
GetCurrentProcess
ExitProcess
GetFileAttributesExA
PeekConsoleInputA
lstrcmpA
lstrcpy
FindResourceExA
OpenSemaphoreA
lstrcmpi
SetProcessPriorityBoost
WritePrivateProfileStringA
SetProcessPriorityBoost
SetConsolePalette
GetTempPathA
GetMailslotInfo
SetCommConfig
CreateNamedPipeA
GetConsoleCursorMode
SetConsoleTitleA
GetPrivateProfileIntA
SetConsoleOutputCP
GetComputerNameExA
GetCurrentThreadId
LZOpenFileA
CreateThread
LZSeek
PeekNamedPipe
FindFirstFileExA
FlushFileBuffers
advapi32
QueryRecoveryAgentsOnEncryptedFile
CredReadDomainCredentialsA
user32
DefDlgProcA
GetLastInputInfo
CheckDlgButton
ShowOwnedPopups
DeviceEventWorker
GetDesktopWindow
CallMsgFilterA
DrawStateA
GetParent
MenuWindowProcA
DefFrameProcA
OffsetRect
FlashWindowEx
SetRectEmpty
GetWindowPlacement
ChangeDisplaySettingsExW
GetScrollBarInfo
CharUpperBuffA
DefRawInputProc
DrawStateA
GetMenuItemCount
CascadeWindows
GetClassLongA
DrawStateA
CallWindowProcA
MapVirtualKeyExW
LoadStringA
GetAncestor
CharNextExA
UnhookWindowsHook
GetKeyNameTextA
EndDeferWindowPos
ReplyMessage
CreateDialogParamA
GetAltTabInfoA
d3d8
Direct3DCreate8
opengl32
glRasterPos2i
Sections
CODE Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 280B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 40B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 203KB - Virtual size: 202KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ