?CounterW@@YGXK@Z
Static task
static1
Behavioral task
behavioral1
Sample
916a7e2da34f1f1f6aef7d3c07f1620e864b2430b51a0aee8cb284ea723bb0fb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
916a7e2da34f1f1f6aef7d3c07f1620e864b2430b51a0aee8cb284ea723bb0fb.exe
Resource
win10v2004-20221111-en
General
-
Target
916a7e2da34f1f1f6aef7d3c07f1620e864b2430b51a0aee8cb284ea723bb0fb
-
Size
144KB
-
MD5
006d8aca102980fc4a670389a1cc4590
-
SHA1
e5f01511b37dfc871e4f517fecb02d4db28d2409
-
SHA256
916a7e2da34f1f1f6aef7d3c07f1620e864b2430b51a0aee8cb284ea723bb0fb
-
SHA512
4193afd0a6db5356d721dcdca54d202e43e33ce592b2dcf7dc022d541373075149be75886316c335f21c4b0ee774b6a1cd44a76e4fbfdcdee0215fcf24a9f69e
-
SSDEEP
3072:+7sqNY6u9gf/0iZf3jpaijV6rV62yLyUX2GV/g6Nn5+hKQufQxw:2NY6uifc4YihI6ZG0gjMzf/
Malware Config
Signatures
Files
-
916a7e2da34f1f1f6aef7d3c07f1620e864b2430b51a0aee8cb284ea723bb0fb.exe windows x86
fc1a4feaacc8550d54ab7bd0e8ef54e6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
ord29
kernel32
GlobalMemoryStatus
lstrcmpW
FormatMessageA
LoadLibraryA
GlobalUnlock
GetComputerNameExW
OpenFile
CreateWaitableTimerW
SetTimerQueueTimer
FindClose
GetThreadLocale
GetCurrentThreadId
GetSystemDefaultLangID
GetDateFormatW
MoveFileExW
HeapSize
LoadLibraryExA
SetNamedPipeHandleState
GetNumberFormatW
CreateSemaphoreW
GlobalSize
SetFileApisToOEM
DeleteFileW
GlobalReAlloc
DeviceIoControl
FileTimeToSystemTime
GetSystemInfo
ResetEvent
LCMapStringW
OpenEventA
CreateWaitableTimerA
SetSystemTime
VirtualQuery
DuplicateHandle
WriteFile
GetTempFileNameA
GetComputerNameW
DeleteCriticalSection
LocalUnlock
GetSystemTimeAdjustment
EnumResourceNamesW
GetCurrentThread
SetThreadLocale
SleepEx
SearchPathW
FindFirstFileW
GetModuleFileNameA
GetSystemTimeAsFileTime
GetHandleInformation
GetCurrentDirectoryA
TlsSetValue
CancelIo
GetSystemDirectoryA
TryEnterCriticalSection
GetThreadTimes
SetEndOfFile
VirtualFree
GlobalAddAtomW
WaitForMultipleObjects
DeleteAtom
lstrcatA
LocalReAlloc
CreateFileW
GetLongPathNameW
FindResourceExA
LocalAlloc
LockFile
InitializeCriticalSection
lstrcmpA
TlsGetValue
IsValidLanguageGroup
GetCommTimeouts
GetVersion
GetACP
SystemTimeToFileTime
GetNumberFormatA
FormatMessageW
OpenFileMappingA
GetStdHandle
FindNextFileA
GetOEMCP
QueryDosDeviceW
LCMapStringA
QueryPerformanceCounter
SizeofResource
GetTempPathW
CopyFileW
CompareStringA
SetFileAttributesW
EscapeCommFunction
AddAtomW
GetStartupInfoW
CreateEventA
FindResourceExW
GlobalFindAtomW
GetFileAttributesA
RemoveDirectoryW
CompareFileTime
FreeResource
GetWindowsDirectoryA
LocalLock
user32
GetWindowDC
IsDlgButtonChecked
Exports
Exports
Sections
.text Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 93B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 574B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ