Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
273KB
-
MD5
03ffb735d856b92add2e2356de67fa3e
-
SHA1
6d3254a7a7594dc7d07e4f4eec6082513fdc5ca3
-
SHA256
cb2c92744e9408b81df6d78e92864d280635946b7d6de82e032124ac031ac100
-
SHA512
8cc7c8f4d038ca9f8d8618fdfa412d13883b9e713b5e24a31bc98062e83a86015c687efc8c69bbe3f653aa0dd26ea36c41cc3fb67c3aaf48e8bf895ff69d79d6
-
SSDEEP
3072:0NsnLL3FjLb0RviQuFdhMGjv2/p2TZvUqWnEsAPCxk24HdKUPLszb/v0V7XEr40q:0mLVLzFMduvmnKPkklFPgzr40M2b
Malware Config
Signatures
Files
-
file.exe.exe windows x86
3670997c8c2669588bad5b8c178dedd4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryW
CallNamedPipeA
EnumSystemCodePagesW
EnumDateFormatsW
OpenMutexW
GetConsoleAliasesLengthA
AreFileApisANSI
EnumCalendarInfoExA
RequestWakeupLatency
GetConsoleAliasW
GetModuleHandleW
CreateDirectoryExW
GetLogicalDriveStringsW
ReadConsoleInputA
FindNextVolumeMountPointA
SearchPathA
MoveFileA
GetCurrentDirectoryW
GetSystemDirectoryA
CreateMailslotA
CommConfigDialogA
GetProcAddress
LoadLibraryA
LocalAlloc
InterlockedExchange
CreateJobObjectA
ReadConsoleOutputAttribute
FindFirstVolumeW
LocalFree
GetCurrentConsoleFont
GlobalFlags
CloseHandle
ZombifyActCtx
SetConsoleCtrlHandler
AddAtomA
SetThreadPriority
FreeEnvironmentStringsW
GetConsoleTitleA
SetVolumeMountPointA
ClearCommError
lstrlenW
CreateDirectoryA
GlobalFindAtomA
OpenJobObjectW
CopyFileW
lstrcpynW
VerSetConditionMask
EnumSystemLocalesA
InterlockedFlushSList
WritePrivateProfileSectionA
GetStringTypeExA
GetFileAttributesW
GetCurrentActCtx
WriteFile
MoveFileW
GetLogicalDriveStringsA
ResetEvent
OpenMutexA
SetHandleCount
FindResourceW
GetConsoleAliasExesLengthW
GetConsoleSelectionInfo
InterlockedDecrement
GetModuleHandleA
GetTickCount
Sleep
ExitProcess
GetLastError
DeleteFileA
GetStartupInfoW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetStdHandle
GetModuleFileNameA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
RtlUnwind
GetLocaleInfoA
WideCharToMultiByte
HeapAlloc
VirtualAlloc
HeapReAlloc
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CreateFileA
Sections
.text Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 125KB - Virtual size: 234KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ