Static task
static1
Behavioral task
behavioral1
Sample
d62d01732a23e56c166ff9c757b42f0ef2305f1556f94d90a582d814c682a65c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d62d01732a23e56c166ff9c757b42f0ef2305f1556f94d90a582d814c682a65c.exe
Resource
win10v2004-20221111-en
General
-
Target
d62d01732a23e56c166ff9c757b42f0ef2305f1556f94d90a582d814c682a65c
-
Size
972KB
-
MD5
a45bc238c42fad545040b4e5539899fe
-
SHA1
11294108cd0ab8fd8c853ed3fb1ed4f881a64356
-
SHA256
d62d01732a23e56c166ff9c757b42f0ef2305f1556f94d90a582d814c682a65c
-
SHA512
37b1749c6bcb16348476bce48205f25e4dbcb57fc582f4e7851f26152a5e79ec2e3ac6cefe34d85153c9cbd65c588b48de85e34571781f949d32b2216623e49b
-
SSDEEP
24576:p3Cv+A1b+lyJ09taJuVI22ahVJe7HYsA1kSSpg:hXA9GtKraFe7HYd3/
Malware Config
Signatures
Files
-
d62d01732a23e56c166ff9c757b42f0ef2305f1556f94d90a582d814c682a65c.exe windows x86
3c616f54e9945d3eb41cb2f2ac6d6bc3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
CommandLineToArgvW
kernel32
CreateFileW
LockResource
LoadResource
FindResourceW
GetTempPathW
InitializeCriticalSectionAndSpinCount
GetLastError
RaiseException
DecodePointer
DeleteCriticalSection
HeapFree
GetCurrentProcess
HeapAlloc
GetProcessHeap
WriteFile
FindClose
CreateEventW
MultiByteToWideChar
WideCharToMultiByte
WriteConsoleW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
SizeofResource
GetModuleHandleW
CreateProcessW
VirtualAllocEx
GetProcAddress
QueueUserAPC
CloseHandle
ResumeThread
GetModuleFileNameW
TerminateProcess
ExpandEnvironmentStringsW
WriteProcessMemory
GetCommandLineW
FlushFileBuffers
SetStdHandle
FindFirstFileExA
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
HeapSize
EnterCriticalSection
LeaveCriticalSection
EncodePointer
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CompareStringW
LCMapStringW
GetStringTypeW
GetCPInfo
SetEvent
ResetEvent
WaitForSingleObjectEx
InitializeSListHead
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
OutputDebugStringW
InterlockedPushEntrySList
RtlUnwind
FreeLibrary
LoadLibraryExW
HeapReAlloc
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
GetStdHandle
GetCommandLineA
GetACP
GetFileType
FindNextFileA
shlwapi
SHGetValueW
SHSetValueW
rpcrt4
UuidToStringW
RpcStringFreeW
UuidCreate
Sections
.text Size: 233KB - Virtual size: 232KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 444B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 70.5MB - Virtual size: 70.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ