Static task
static1
Behavioral task
behavioral1
Sample
f1f85361fabfa814df4fbd87359b3cf9a6272225cd921c6e844a95f40aa87cdb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f1f85361fabfa814df4fbd87359b3cf9a6272225cd921c6e844a95f40aa87cdb.exe
Resource
win10v2004-20221111-en
General
-
Target
f1f85361fabfa814df4fbd87359b3cf9a6272225cd921c6e844a95f40aa87cdb
-
Size
4.7MB
-
MD5
71834886392cc3e3b8cbc8aeadef7bef
-
SHA1
1368223eab61a73ace191aa1287746e5b4281ee0
-
SHA256
f1f85361fabfa814df4fbd87359b3cf9a6272225cd921c6e844a95f40aa87cdb
-
SHA512
91b14c4ef6b52969e8168e5a08d9871d73f484b2100ec51163ba49747ffd4e88b50683f3773ddf6c77520846dbbb04c20e86954e858ab336c6cf1a200b7a3756
-
SSDEEP
24576:UDyTFtjjDyTFtjQDyTFtjeDyTFtjIDyTFtjjDyTFtjQDyTFtjeDyTFtjMDyTFtjC:ttwtFtntVtwtFtntBtwtFtnt
Malware Config
Signatures
Files
-
f1f85361fabfa814df4fbd87359b3cf9a6272225cd921c6e844a95f40aa87cdb.exe windows x86
85d9ff85a87ad44023ce559e891a7f16
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineW
GetProcAddress
LoadLibraryExW
ExitProcess
OpenEventA
WaitForSingleObject
WinExec
VirtualAllocEx
SleepEx
LoadLibraryA
GetModuleFileNameA
GetModuleHandleA
CreateFileA
SetMessageWaitingIndicator
LoadLibraryExA
LockFile
GetCurrencyFormatA
ReadConsoleInputExW
VerLanguageNameA
lstrcatA
LZOpenFileW
SetConsoleFont
IsBadStringPtrA
FindActCtxSectionGuid
ResumeThread
WriteConsoleInputVDMW
CopyFileA
LocalUnlock
GetTapeStatus
CreateSemaphoreA
GlobalSize
CreateNamedPipeW
GetShortPathNameW
CreateNlsSecurityDescriptor
HeapCreate
EnumerateLocalComputerNamesA
lstrcpynW
PeekConsoleInputA
GetNumberOfConsoleFonts
DeleteAtom
GetNumberOfConsoleInputEvents
AssignProcessToJobObject
EnumCalendarInfoA
LZCreateFileW
DefineDosDeviceW
CompareFileTime
GetConsoleInputExeNameA
GetPrivateProfileSectionNamesA
PrivCopyFileExW
InterlockedExchangeAdd
GetConsoleCommandHistoryLengthA
EnumResourceNamesA
VerLanguageNameW
ReadConsoleInputW
LocalHandle
GetModuleFileNameW
FindFirstFileW
FindFirstChangeNotificationA
WTSGetActiveConsoleSessionId
ExtendVirtualBuffer
GetFileInformationByHandle
LocalShrink
SignalObjectAndWait
lstrcpynA
IsDebuggerPresent
UnregisterConsoleIME
GetEnvironmentStringsA
QueryPerformanceFrequency
CreateJobObjectA
GetFullPathNameA
DeleteFileW
GetCommConfig
OpenWaitableTimerA
GetCurrentDirectoryW
GetTempPathA
GetSystemWindowsDirectoryA
FindFirstVolumeW
WriteConsoleA
SetConsoleDisplayMode
LoadLibraryW
GetVDMCurrentDirectories
SetConsoleInputExeNameW
MulDiv
GetTempPathW
lstrlenA
CreateRemoteThread
SearchPathA
CreateWaitableTimerA
GlobalHandle
GetUserDefaultLangID
GetNumberOfConsoleMouseButtons
LZOpenFileA
SetThreadPriorityBoost
CreateIoCompletionPort
EnumTimeFormatsA
MoveFileExA
EnumDateFormatsW
GetExpandedNameW
WritePrivateProfileStringW
CreateActCtxA
AddRefActCtx
BuildCommDCBW
GetModuleHandleExW
SetFirmwareEnvironmentVariableA
FindNextVolumeMountPointA
SetProcessPriorityBoost
IsSystemResumeAutomatic
SetTermsrvAppInstallMode
VirtualAlloc
Process32FirstW
EnumCalendarInfoExW
GetStringTypeW
SetLocaleInfoA
CancelDeviceWakeupRequest
CreateMemoryResourceNotification
GetVolumePathNameA
UTRegister
NlsConvertIntegerToString
ReadConsoleInputA
SetLocalPrimaryComputerNameW
GetLocalTime
GetProcessShutdownParameters
UTUnRegister
GetTempFileNameA
LZDone
SetEnvironmentVariableA
GetDllDirectoryA
RegisterWowBaseHandlers
ScrollConsoleScreenBufferA
GlobalMemoryStatusEx
SetTimeZoneInformation
WritePrivateProfileStructA
GetSystemDirectoryW
EnumSystemLanguageGroupsA
WaitForDebugEvent
FindNextVolumeA
GlobalDeleteAtom
EnumSystemLocalesA
ProcessIdToSessionId
CreateEventA
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE