Static task
static1
Behavioral task
behavioral1
Sample
b2840b48afe6d10fd0922a6287be408d630f68d3853d7ceb97ffea01511d9fc3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b2840b48afe6d10fd0922a6287be408d630f68d3853d7ceb97ffea01511d9fc3.exe
Resource
win10v2004-20220812-en
General
-
Target
b2840b48afe6d10fd0922a6287be408d630f68d3853d7ceb97ffea01511d9fc3
-
Size
151KB
-
MD5
367a49380ef3ed69d24df9702cffa415
-
SHA1
29497f7c882e3da5465786d10d6de7e56355d6c6
-
SHA256
048982f1e1ea160aeef7944db6fb37bcc630f229d1e47553655d946f0749083f
-
SHA512
92077c029a2688443650cc62d33db7582964d219849d13a113b5cd3f339b36c12be6b5d8ffefc11b8a074340808433a00e8369bb672871abb83dad452b97d300
-
SSDEEP
3072:5G0646n6arUDU17tUcT/R3nrswKgi6O0D1jTtN6bN8wnk2ZKrd:N64GrUDehdXr/HO+jpSN8wnN4x
Malware Config
Signatures
Files
-
b2840b48afe6d10fd0922a6287be408d630f68d3853d7ceb97ffea01511d9fc3.zip
-
b2840b48afe6d10fd0922a6287be408d630f68d3853d7ceb97ffea01511d9fc3.exe windows x86
8dc952aad89199c54629c246576ee419
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateDirectoryExA
ReadConsoleInputA
GetTempPathW
GetSystemDirectoryW
RemoveDirectoryA
OutputDebugStringW
GetProcAddress
LocalAlloc
ExitThread
FindResourceA
LoadModule
InterlockedDecrement
RemoveVectoredExceptionHandler
lstrcatA
GetBinaryTypeW
SearchPathW
VerifyVersionInfoW
CopyFileExW
EndUpdateResourceA
GetModuleHandleW
FindFirstVolumeA
LocalShrink
LocalFlags
_llseek
UpdateResourceW
CreateActCtxW
CopyFileA
FindFirstFileW
FreeEnvironmentStringsW
EnumResourceLanguagesW
InterlockedIncrement
MoveFileWithProgressW
GetModuleHandleA
GetTickCount
SetLastError
GetPrivateProfileStructW
AddConsoleAliasA
GetConsoleAliasA
FindNextFileA
LoadLibraryA
GetLastError
HeapReAlloc
HeapAlloc
DeleteFileA
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapCreate
VirtualFree
VirtualAlloc
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RaiseException
InitializeCriticalSectionAndSpinCount
RtlUnwind
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
HeapSize
CreateFileA
CloseHandle
FlushFileBuffers
user32
CharUpperBuffW
gdi32
SetBrushOrgEx
advapi32
AccessCheckByType
Sections
.text Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 70KB - Virtual size: 179KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 86KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ