Static task
static1
Behavioral task
behavioral1
Sample
df9ebfa6528753486c62586458543049018d186469170a18ece81986c01ad1ec.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
df9ebfa6528753486c62586458543049018d186469170a18ece81986c01ad1ec.exe
Resource
win10v2004-20220901-en
General
-
Target
df9ebfa6528753486c62586458543049018d186469170a18ece81986c01ad1ec
-
Size
628KB
-
MD5
72718577a00e2e0f811f0cd61ada33cb
-
SHA1
232308538d319858a2b2b6523988b2dfd977811a
-
SHA256
df9ebfa6528753486c62586458543049018d186469170a18ece81986c01ad1ec
-
SHA512
f8a00937531dd9114584e6086b74244b664e5a899aad9ba31d0adb1b8f53ee0b30834a4ab389edd4235bd45e6a7222edf30bc3b41ae770bc173cbb15893e93ea
-
SSDEEP
12288:XJvA5iYLZ+ARkMv6Wro3TI82mKMEj6WFJFXt5KYFynyxvVAT:XJvA5iYtZvHr8vJnEj6YFXt5fBxva
Malware Config
Signatures
Files
-
df9ebfa6528753486c62586458543049018d186469170a18ece81986c01ad1ec.exe windows x86
3907eb53a7f1c7b83377fa2170b93f64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineW
SetFileApisToOEM
WideCharToMultiByte
GetACP
MultiByteToWideChar
InterlockedExchangeAdd
FindFirstFileW
FindClose
CreateFileW
GetLastError
GetVersionExW
GetFullPathNameW
GetTempFileNameW
MoveFileExW
CreateDirectoryW
SetFileTime
GetFileAttributesW
lstrlenW
MoveFileW
CloseHandle
DeleteFileW
SetFileAttributesW
GetFileSize
SetFilePointer
SetEndOfFile
WriteFile
ReadFile
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
FreeLibrary
LoadLibraryW
FindResourceW
GetModuleHandleW
GetProcAddress
GetStringTypeW
EncodePointer
DecodePointer
IsProcessorFeaturePresent
IsDebuggerPresent
HeapFree
GetCommandLineA
SetConsoleCtrlHandler
GetSystemTimeAsFileTime
RaiseException
RtlUnwind
GetCPInfo
HeapAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
ExitProcess
GetModuleHandleExW
HeapSize
GetProcessHeap
GetCurrentThreadId
GetStdHandle
GetFileType
GetModuleFileNameA
GetModuleFileNameW
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsValidCodePage
GetOEMCP
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
HeapReAlloc
LoadLibraryExW
OutputDebugStringW
SetStdHandle
WriteConsoleW
ReadConsoleW
FormatMessageW
LocalFree
FileTimeToSystemTime
FileTimeToLocalFileTime
VirtualFree
VirtualAlloc
WaitForMultipleObjects
WaitForSingleObject
SetEvent
ResetEvent
CreateThread
ExitThread
ResumeThread
user32
LoadStringW
Sections
.text Size: 326KB - Virtual size: 326KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ