Static task
static1
Behavioral task
behavioral1
Sample
31f76268114678397309b4d7696008065316118c055fa95c581870ed9569a91e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
31f76268114678397309b4d7696008065316118c055fa95c581870ed9569a91e.exe
Resource
win10v2004-20220812-en
General
-
Target
31f76268114678397309b4d7696008065316118c055fa95c581870ed9569a91e
-
Size
216KB
-
MD5
c364f8a5723ed1759dba17e1a9d14a72
-
SHA1
a8e353aacfd1f78f7b52edbb91752b57b5febf43
-
SHA256
31f76268114678397309b4d7696008065316118c055fa95c581870ed9569a91e
-
SHA512
f65a0ebe1a1055eb91b8213e81132cd452b4fc03007fe16b44360d1860726fcdc3df6df7f7cb97f8382ff82dd8cae37b337009eaebdd9184daa0e8fb26361abd
-
SSDEEP
3072:59mi9zO0K70lSq225lYJI0DZKwIUkWmAKV11eda718:5v96wOWlqJKPUXI1eY718
Malware Config
Signatures
Files
-
31f76268114678397309b4d7696008065316118c055fa95c581870ed9569a91e.exe windows x86
7f8674f255db67a2ce23bc21ac99a414
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFullPathNameA
LoadLibraryExA
FreeLibrary
SetLastError
SearchPathA
GetLastError
ExitProcess
CreateEventA
CreateFileMappingA
MapViewOfFile
GetCurrentDirectoryW
ReadProcessMemory
WriteProcessMemory
FlushInstructionCache
VirtualAllocEx
CreateRemoteThread
LoadLibraryW
WaitForMultipleObjects
CloseHandle
UnmapViewOfFile
ResumeThread
WaitForSingleObject
VirtualFreeEx
GetExitCodeProcess
TerminateProcess
FlushFileBuffers
WriteConsoleW
GetProcAddress
LoadLibraryExW
GetCurrentProcess
GetModuleHandleW
VirtualProtectEx
VirtualQueryEx
CreateProcessA
GetEnvironmentVariableA
IsDebuggerPresent
IsProcessorFeaturePresent
GetCommandLineA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetCurrentThreadId
EncodePointer
DecodePointer
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetModuleFileNameA
WriteFile
GetModuleFileNameW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
RtlUnwind
HeapAlloc
RaiseException
HeapFree
EnterCriticalSection
LeaveCriticalSection
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
OutputDebugStringW
GetConsoleCP
GetConsoleMode
SetFilePointerEx
HeapReAlloc
GetStringTypeW
HeapSize
LCMapStringW
SetStdHandle
CreateFileW
user32
MessageBoxA
Sections
.text Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 114KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
�e�ңuM Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE