Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
267KB
-
MD5
1830bf3fa6c123f9769d64f9f93a26c3
-
SHA1
c008ff17b83667063133ae5b4a889386c4a3d3d3
-
SHA256
14e03d30c9ba60d26847cccdb8caf523a9b08e9fd158ab35fe239609a04f96f7
-
SHA512
76dc1fdab9f96edf98023e38e2e12e1700c3dd9c328e7a676306a56e60d46c2dea735c38f63da953de6e80c132fcd43a32655e2b6a0f3f527e09f3facebab79e
-
SSDEEP
3072:UXEtcnYy+fvILPQb+EOk5eIRzWdbaZpTYXhYrMqDepuXk6BNCanng0Pb:Q1i3ILKOCzWEZpTE6YhmNng6
Malware Config
Signatures
Files
-
file.exe.exe windows x86
aeb522c579d7012042ba12518b1bf43a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForDebugEvent
LCMapStringW
GetProcAddress
GetModuleHandleA
LocalAlloc
GetBinaryTypeA
SearchPathW
VerifyVersionInfoW
ExpandEnvironmentStringsW
EndUpdateResourceW
FindNextFileA
FindFirstVolumeW
LocalFlags
LoadLibraryW
GlobalFlags
CopyFileA
CreateActCtxW
lstrlenW
UpdateResourceA
CreateActCtxA
DeleteVolumeMountPointA
GetCurrentDirectoryW
MoveFileWithProgressA
CreateMutexW
DeactivateActCtx
MoveFileA
GetLogicalDriveStringsA
ResetEvent
InterlockedPushEntrySList
CreateMailslotW
WriteConsoleInputW
QueryDosDeviceA
InterlockedDecrement
EnumTimeFormatsA
SetFileValidData
FindFirstFileA
FreeEnvironmentStringsA
LocalReAlloc
GlobalAlloc
GetTickCount
SetLastError
GetPrivateProfileStructA
CopyFileExW
GetTempPathW
ReadConsoleInputA
CreateDirectoryExW
GetConsoleAliasA
InterlockedExchangeAdd
LoadLibraryA
MultiByteToWideChar
GetLastError
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
DeleteFileA
GetStartupInfoW
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapFree
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
CloseHandle
HeapAlloc
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
RaiseException
VirtualAlloc
HeapReAlloc
LCMapStringA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RtlUnwind
InitializeCriticalSectionAndSpinCount
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
HeapSize
CreateFileA
gdi32
GetCharWidth32A
GetCharABCWidthsA
SelectObject
GetTextFaceW
GetBrushOrgEx
winhttp
WinHttpOpen
Sections
.text Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 70KB - Virtual size: 39.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 111KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ