Static task
static1
Behavioral task
behavioral1
Sample
3a606f5b72d8a87dad5a36873bf5ea9a86fb651d50632a23be284cbd54c1f034.exe
Resource
win10v2004-20221111-en
General
-
Target
3a606f5b72d8a87dad5a36873bf5ea9a86fb651d50632a23be284cbd54c1f034
-
Size
1.1MB
-
MD5
23646d3d80933aa3fbd81a29f4ddab8b
-
SHA1
29f1f063f3c5a3065c1da7f51531dc3b3e2e1f9b
-
SHA256
3a606f5b72d8a87dad5a36873bf5ea9a86fb651d50632a23be284cbd54c1f034
-
SHA512
b8a4a8fb33df56f0062aab8ecc41bcc4df3e44ade73fa1689d3aeb7e3f40f143b7c9f2d9cca912d7804030f2dc0e72475aa8f9294d20bac6c0d04a450e30af9d
-
SSDEEP
24576:cqXvLFd01Ihv1nAq8pFxqAt6Mqs5Va7OCHqMLRGaMS9V8I/b/OQL:cQFd0+xJjVQ6i5Va7OCbFG69V8I71
Malware Config
Signatures
Files
-
3a606f5b72d8a87dad5a36873bf5ea9a86fb651d50632a23be284cbd54c1f034.exe windows x86
baa58b5afdf305a26da09f691bb47ea6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetHandleCount
GetConsoleAliasA
GetModuleHandleW
CreateDirectoryExW
GetLogicalDriveStringsW
ReadConsoleInputA
lstrcmpA
SearchPathA
CopyFileExW
CallNamedPipeW
TlsGetValue
GetProcAddress
LocalAlloc
GetCommandLineW
InterlockedIncrement
FindFirstChangeNotificationW
FindResourceA
ConvertDefaultLocale
GetConsoleMode
LocalFree
LocalFlags
InterlockedDecrement
ExitProcess
GetCurrencyFormatW
BackupWrite
CreateActCtxA
GetPrivateProfileIntA
SetFileApisToOEM
SetVolumeMountPointW
GetSystemWindowsDirectoryA
lstrlenW
CreateDirectoryA
GlobalFindAtomW
CopyFileW
VerSetConditionMask
CreateMutexW
DeactivateActCtx
GetDiskFreeSpaceA
MoveFileW
GetLogicalDriveStringsA
SetEvent
MoveFileExW
OpenMutexA
FindResourceW
SetFileTime
SetFilePointer
FindFirstFileA
InterlockedCompareExchange
FreeEnvironmentStringsA
InterlockedExchangeAdd
GetTickCount
GetLogicalDrives
OpenMutexW
GetConsoleAliasesLengthA
EnumDateFormatsW
_lread
LoadLibraryA
MultiByteToWideChar
GetLastError
WideCharToMultiByte
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
Sleep
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapAlloc
VirtualAlloc
HeapReAlloc
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
GetConsoleCP
FlushFileBuffers
RtlUnwind
InitializeCriticalSectionAndSpinCount
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
HeapSize
CreateFileA
CloseHandle
user32
DrawCaption
gdi32
GetBrushOrgEx
advapi32
SetThreadToken
InitiateSystemShutdownW
Sections
.text Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 955KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 94KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ