Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20221111-en
General
-
Target
file.exe
-
Size
897KB
-
MD5
2f945b593a83b109d744ecdaf66dec76
-
SHA1
ccd0ff2c46f48fd48023b229dcfb149d7a72d4e6
-
SHA256
26af6e21a89fadb0c6506c81b0ff3b1ae0b979ec9b85bc70fd88b6fa629621a8
-
SHA512
f234fdcecfc33785b062eac04bf139000b46df28ad8999c3fc077b267f2c71729c0456a6496285a7fb22176e4cbb51831f9ef450d2f20c473197fe6251d0d0f9
-
SSDEEP
24576:N3OUMeK5Z6MV364vRe5sCAyEwKwEolRx84ytOPazqodGpV3:TMV36PsCzEdPoB84ygPzodw
Malware Config
Signatures
Files
-
file.exe.exe windows x86
b18d5931764ea3e020ff659575688240
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindNextFileA
FindClose
CreateMutexA
WaitForSingleObject
GetCurrentThreadId
ReleaseMutex
lstrcatA
OpenProcess
MultiByteToWideChar
Sleep
GetTempPathA
CopyFileA
GetLastError
GetFileAttributesA
LoadLibraryA
CloseHandle
ExitProcess
WideCharToMultiByte
CreateProcessA
CreateDirectoryA
lstrlenA
GetModuleHandleA
GetProcAddress
lstrcpynA
AreFileApisANSI
ReadFile
TryEnterCriticalSection
HeapCreate
HeapFree
EnterCriticalSection
GetFullPathNameW
WriteFile
GetDiskFreeSpaceW
OutputDebugStringA
LockFile
LeaveCriticalSection
InitializeCriticalSection
SetFilePointer
GetFullPathNameA
SetEndOfFile
UnlockFileEx
GetTempPathW
CreateMutexW
TerminateProcess
GetFileAttributesW
UnmapViewOfFile
HeapValidate
HeapSize
FormatMessageW
GetDiskFreeSpaceA
GetFileAttributesExW
OutputDebugStringW
FlushViewOfFile
CreateFileA
WaitForSingleObjectEx
DeleteFileA
DeleteFileW
HeapReAlloc
GetSystemInfo
LoadLibraryW
HeapAlloc
HeapCompact
HeapDestroy
UnlockFile
LocalFree
LockFileEx
GetFileSize
DeleteCriticalSection
GetCurrentProcessId
GetProcessHeap
SystemTimeToFileTime
FreeLibrary
GetSystemTimeAsFileTime
GetSystemTime
FormatMessageA
CreateFileMappingW
MapViewOfFile
QueryPerformanceCounter
GetTickCount
FlushFileBuffers
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
GetCurrentProcess
SetPriorityClass
FindFirstFileA
CreateFileW
GetModuleFileNameA
FindNextFileW
FindFirstFileExW
GetTimeZoneInformation
MoveFileExW
GetConsoleOutputCP
WriteConsoleW
LCMapStringW
CompareStringW
InitializeCriticalSectionEx
EncodePointer
DecodePointer
GetModuleHandleW
GetStringTypeW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
RtlUnwind
RaiseException
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
SetFilePointerEx
GetConsoleMode
ReadConsoleW
GetFileType
user32
CloseDesktop
GetWindowThreadProcessId
EnumDesktopWindows
advapi32
GetUserNameA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
shell32
SHGetSpecialFolderPathA
ShellExecuteA
SHGetFolderPathA
ws2_32
WSACleanup
WSAGetLastError
getaddrinfo
setsockopt
recv
connect
socket
send
closesocket
WSAStartup
freeaddrinfo
Sections
.text Size: 776KB - Virtual size: 775KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 34KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ