Static task
static1
Behavioral task
behavioral1
Sample
a311cf77fa166611dd4ea83a1211f43cf5e97619bf6034237eec466ecf3924b2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a311cf77fa166611dd4ea83a1211f43cf5e97619bf6034237eec466ecf3924b2.exe
Resource
win10-20220812-en
General
-
Target
a311cf77fa166611dd4ea83a1211f43cf5e97619bf6034237eec466ecf3924b2
-
Size
764.3MB
-
MD5
5844dfc3613f340292380307a3546573
-
SHA1
f5b11b424a637188d624a1f4c612f0af85c820be
-
SHA256
a311cf77fa166611dd4ea83a1211f43cf5e97619bf6034237eec466ecf3924b2
-
SHA512
dc5f19f7a178581191af05f35f182c6d03614a7dc2581cd8b2d28496058c181ef69d56a55ae58de4d647952919cda4408ad5f3f36ec206e3caed75b959992ec4
-
SSDEEP
49152:kSGyf9Pr5qpdU/UKAVZ/u84VJ/HiiJSC0/WdmS:kS75VUkamTpCioC0/Wdm
Malware Config
Signatures
Files
-
a311cf77fa166611dd4ea83a1211f43cf5e97619bf6034237eec466ecf3924b2.exe windows x86
93cb87d55c108427952814698f409cb4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObjectEx
CreateThread
ExitThread
GetTickCount64
VirtualAllocEx
GetCommandLineA
SetUnhandledExceptionFilter
QueryPerformanceCounter
LeaveCriticalSection
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
TlsGetValue
GetTickCount
VirtualProtect
GetModuleHandleA
GetModuleHandleW
GlobalAlloc
lstrcmpA
lstrcmpiA
lstrlenA
CloseHandle
CreateFileW
SetFilePointerEx
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
HeapReAlloc
HeapSize
GetStringTypeW
SetStdHandle
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
GetStartupInfoW
GetSystemTimeAsFileTime
InitializeSListHead
TerminateProcess
RaiseException
RtlUnwind
GetLastError
SetLastError
EncodePointer
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
WriteFile
HeapFree
HeapAlloc
MultiByteToWideChar
LCMapStringW
DecodePointer
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineW
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
GetFileType
WriteConsoleW
user32
DialogBoxParamA
SendMessageA
EndDialog
FindWindowA
shlwapi
PathFindOnPathA
PathGetDriveNumberA
PathFileExistsA
StrToIntA
PathFindExtensionA
PathFindSuffixArrayA
Sections
.text Size: 144KB - Virtual size: 143KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ