Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
General
-
Target
file.exe
-
Size
334KB
-
MD5
4569f81ad725c65ab4ce8c6bb4adde58
-
SHA1
e0290ecc4fa208719967115560bd4f5e6854ca12
-
SHA256
6acde2d4a9ae84d6772ccc4c8f027e72e735b7a1665624fbce6bd1f3ddc62c16
-
SHA512
9ad103fe97fd1f6c8f76c26380765d2c009e29946926e06300f81db5640d85b55fda0db0a771c4b6726732f1cb36260ae0373d6b226c0bb390f682abde5486f9
-
SSDEEP
6144:k6ML+HAtMUPIP5mM8+l41tOZbykYAhnf7gK6Kg9TjBfbgzH440M2b:k6M0IIP5mssOsjcR6Kg5jtU
Malware Config
Signatures
Files
-
file.exe.exe windows x86
3670997c8c2669588bad5b8c178dedd4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryW
CallNamedPipeA
EnumSystemCodePagesW
EnumDateFormatsW
OpenMutexW
GetConsoleAliasesLengthA
AreFileApisANSI
EnumCalendarInfoExA
RequestWakeupLatency
GetConsoleAliasW
GetModuleHandleW
CreateDirectoryExW
GetLogicalDriveStringsW
ReadConsoleInputA
FindNextVolumeMountPointA
SearchPathA
MoveFileA
GetCurrentDirectoryW
GetSystemDirectoryA
CreateMailslotA
CommConfigDialogA
GetProcAddress
LoadLibraryA
LocalAlloc
InterlockedExchange
CreateJobObjectA
ReadConsoleOutputAttribute
FindFirstVolumeW
LocalFree
GetCurrentConsoleFont
GlobalFlags
CloseHandle
ZombifyActCtx
SetConsoleCtrlHandler
AddAtomA
SetThreadPriority
FreeEnvironmentStringsW
GetConsoleTitleA
SetVolumeMountPointA
ClearCommError
lstrlenW
CreateDirectoryA
GlobalFindAtomA
OpenJobObjectW
CopyFileW
lstrcpynW
VerSetConditionMask
EnumSystemLocalesA
InterlockedFlushSList
WritePrivateProfileSectionA
GetStringTypeExA
GetFileAttributesW
GetCurrentActCtx
WriteFile
MoveFileW
GetLogicalDriveStringsA
ResetEvent
OpenMutexA
SetHandleCount
FindResourceW
GetConsoleAliasExesLengthW
GetConsoleSelectionInfo
InterlockedDecrement
GetModuleHandleA
GetTickCount
Sleep
ExitProcess
GetLastError
DeleteFileA
GetStartupInfoW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetStdHandle
GetModuleFileNameA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
RtlUnwind
GetLocaleInfoA
WideCharToMultiByte
HeapAlloc
VirtualAlloc
HeapReAlloc
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CreateFileA
Sections
.text Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 186KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ