Static task
static1
Behavioral task
behavioral1
Sample
f73d7e4f277a47045cdf4b1f3041b7392642bf5e2722f41a423ef7a3c2047520.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f73d7e4f277a47045cdf4b1f3041b7392642bf5e2722f41a423ef7a3c2047520.exe
Resource
win10v2004-20220812-en
General
-
Target
f73d7e4f277a47045cdf4b1f3041b7392642bf5e2722f41a423ef7a3c2047520
-
Size
658KB
-
MD5
e6c155f10839a589cbbd3cd0b56bd8de
-
SHA1
5d2e4b74764ca85fead3b6e555657f2b609da3b4
-
SHA256
5aece6613d4ab779926a88e9808ba0d0d26fcd5eba2bf4d861d6a9d1faaff749
-
SHA512
7ba7d31a8bdee1cdbbe6992879d812368d4fd80ffa13a99175c68dd44101ad996552ff6cda5b68ff536c55bb26c287ee08b3dab3cf526b96d9bd450c0d3eb590
-
SSDEEP
12288:wFrS7ZskhAcy60iqTJ5y7LHAzMx/yy8wf1jGqRJAD1nmMQv55xjg7MaAFYYh:xWNcx7OJA7czMx6y8mhnMn1QhXS2GM
Malware Config
Signatures
Files
-
f73d7e4f277a47045cdf4b1f3041b7392642bf5e2722f41a423ef7a3c2047520.zip
-
f73d7e4f277a47045cdf4b1f3041b7392642bf5e2722f41a423ef7a3c2047520.exe windows x86
997a79bbc9b29ccf624aa79059ded875
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFileApisToOEM
SetHandleCount
RequestWakeupLatency
GetConsoleAliasA
GetModuleHandleA
CreateDirectoryExW
GetLogicalDriveStringsW
ReadConsoleInputA
FindNextVolumeMountPointA
AddAtomA
CopyFileExA
CallNamedPipeW
GetCurrentDirectoryW
GetSystemDirectoryA
CreateMailslotW
TlsGetValue
GetProcAddress
LocalAlloc
GetCommandLineW
InterlockedIncrement
ConvertDefaultLocale
GetConsoleMode
FindFirstVolumeW
LocalFree
GlobalFlags
InterlockedDecrement
ExitProcess
GetCurrencyFormatW
BuildCommDCBAndTimeoutsW
CreateActCtxW
GetConsoleAliasesLengthA
GetPrivateProfileIntA
_lread
SetVolumeMountPointW
EnumResourceLanguagesW
LoadModule
lstrlenW
CreateDirectoryA
GlobalFindAtomW
CopyFileW
VerSetConditionMask
CreateMutexW
DeactivateActCtx
GetDiskFreeSpaceA
MoveFileA
SetEvent
MoveFileExW
FindResourceW
SetFileTime
SetFilePointer
FindFirstFileA
EnumResourceLanguagesA
InterlockedCompareExchange
FreeEnvironmentStringsA
InterlockedExchangeAdd
GetModuleHandleW
SetLastError
GetLogicalDrives
EnumDateFormatsW
OpenMutexA
OpenJobObjectW
LoadLibraryA
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetLastError
HeapFree
CloseHandle
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
Sleep
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
SetStdHandle
WideCharToMultiByte
GetConsoleCP
FlushFileBuffers
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
CreateFileA
user32
DrawCaption
gdi32
GetBrushOrgEx
advapi32
InitiateSystemShutdownW
Sections
.text Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 603KB - Virtual size: 741KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 94KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ