Static task
static1
Behavioral task
behavioral1
Sample
d13c673f62b78e6caa9520a5741b7b392ed054b63c16fe813319a6e2980e90af.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d13c673f62b78e6caa9520a5741b7b392ed054b63c16fe813319a6e2980e90af.exe
Resource
win10v2004-20221111-en
General
-
Target
d13c673f62b78e6caa9520a5741b7b392ed054b63c16fe813319a6e2980e90af
-
Size
54KB
-
MD5
e6cf5a5d5646ef0f2abbfaeca5d66c95
-
SHA1
a73b3c530623c557e0565b42b52b623e1e2a700b
-
SHA256
d13c673f62b78e6caa9520a5741b7b392ed054b63c16fe813319a6e2980e90af
-
SHA512
0a5157b533fe48798714617407fcea59b9af1d9e9243e1405f4d22708e2a43d42336f8a03be3a0e21a8bc3f7c462782572ee919fb600f66fff9d8d4d10ced239
-
SSDEEP
768:06+T6XwBE4YcwVFM+yXmiTjulxfVS4tLFcaM7p0UP2KRJ9sic5drgsHLzWx5ZKXW:bXnq+yX7jun44tc7C1KR48dZyIYw
Malware Config
Signatures
Files
-
d13c673f62b78e6caa9520a5741b7b392ed054b63c16fe813319a6e2980e90af.exe windows x86
8427fba7a82049e4787bd84cd4ab1048
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsBadReadPtr
HeapCreate
GetModuleHandleW
GetModuleFileNameW
GetSystemDirectoryW
GetUserDefaultLCID
SystemTimeToFileTime
GetConsoleMode
GetCommandLineA
CreateFileA
GetFileAttributesW
GetACP
ExitProcess
LoadLibraryExA
TlsAlloc
InterlockedIncrement
CreateThread
GetEnvironmentStrings
OpenEventA
ResetEvent
QueryPerformanceCounter
GetModuleHandleA
FindResourceA
OpenMutexA
GetOEMCP
ReleaseMutex
ReleaseSemaphore
GetTickCount
Sleep
GetStdHandle
GetProcessHeap
InitializeCriticalSection
LocalFree
WriteFile
FileTimeToSystemTime
ReadFile
CreateFileMappingW
GetSystemTimeAsFileTime
GetCurrentThreadId
SetEndOfFile
lstrcpyA
HeapDestroy
UnhandledExceptionFilter
DeleteFileA
InterlockedExchange
GetCPInfo
GetVersionExW
FreeEnvironmentStringsA
EnterCriticalSection
GetFileSize
GetComputerNameW
GetCurrentProcessId
GetCurrentProcess
SetStdHandle
UnmapViewOfFile
GlobalAlloc
GetThreadPriority
GetVersion
DeleteCriticalSection
GetExitCodeProcess
LeaveCriticalSection
GetCommandLineW
TlsSetValue
VirtualFree
GetLastError
VirtualAlloc
lstrlenW
FileTimeToLocalFileTime
GetFileAttributesA
HeapAlloc
GetThreadLocale
user32
TranslateMessage
EndDialog
GetSysColor
InsertMenuA
GetAsyncKeyState
GetForegroundWindow
MapWindowPoints
CallWindowProcW
UnregisterClassW
GetSystemMetrics
FillRect
GetParent
GetWindowRect
FindWindowA
LoadBitmapA
DispatchMessageA
ShowWindow
Sections
.text Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
BSS Size: 512B - Virtual size: 451B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 512B - Virtual size: 111B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 460B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 22B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ