Static task
static1
Behavioral task
behavioral1
Sample
1a74fa2a71de05605f1d77389d181fd6222c8f5040505183740450c23ff33140.exe
Resource
win10-20220901-en
General
-
Target
1a74fa2a71de05605f1d77389d181fd6222c8f5040505183740450c23ff33140
-
Size
383KB
-
MD5
cda12bd3ffaf1eee175eeb7e895b644c
-
SHA1
1f230a3603601471ca4698a3a75b60f18b8b933b
-
SHA256
1a74fa2a71de05605f1d77389d181fd6222c8f5040505183740450c23ff33140
-
SHA512
190a75649a83bb3a3b315e60d9faebaa04f9fb95a8c389463c51880811c8338f0cc750acac86df045c4da703b3f8a513dd57e81f9d61bdb55d0260f4721f5010
-
SSDEEP
6144:dfQtL8XSUkX85ZtyClapquB1xqY9xA1hh6K9W9B1gkyded89kTR:dfKgXSlMjtyoapqKDqo8IK9W9B1fzaw
Malware Config
Signatures
Files
-
1a74fa2a71de05605f1d77389d181fd6222c8f5040505183740450c23ff33140.exe windows x86
dd021619be333394dbb32a14f86d077c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitNamedPipeA
CreateJobObjectW
GetSystemDefaultLCID
GetModuleHandleW
GetConsoleAliasesA
GetPriorityClass
GetVolumeInformationA
LoadLibraryW
IsProcessInJob
AssignProcessToJobObject
GetCalendarInfoW
GetFileAttributesW
WriteConsoleW
GetVolumePathNameA
LCMapStringA
FillConsoleOutputCharacterW
GetProfileIntW
GetProcAddress
VirtualAlloc
EnumSystemCodePagesW
SetFileAttributesA
LoadLibraryA
WriteConsoleA
LocalAlloc
SetProcessWorkingSetSize
OpenJobObjectW
FoldStringA
FindFirstChangeNotificationA
GetFileInformationByHandle
FindActCtxSectionStringW
TlsGetValue
GetCPInfo
GetVolumeNameForVolumeMountPointA
GetLastError
GetFullPathNameW
ReadFile
HeapFree
HeapAlloc
Sleep
ExitProcess
GetStartupInfoW
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
WriteFile
GetStdHandle
GetModuleFileNameA
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
SetHandleCount
GetFileType
GetStartupInfoA
SetFilePointer
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RaiseException
GetConsoleOutputCP
MultiByteToWideChar
SetStdHandle
GetACP
GetOEMCP
IsValidCodePage
CloseHandle
CreateFileA
GetModuleHandleA
HeapSize
GetLocaleInfoA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetEndOfFile
GetProcessHeap
gdi32
GetTextExtentExPointW
advapi32
BackupEventLogW
ReportEventW
ole32
WriteFmtUserTypeStg
winhttp
WinHttpCloseHandle
Sections
.text Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 173KB - Virtual size: 184KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.jilup Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dib Size: 1024B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 105KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ