Static task
static1
Behavioral task
behavioral1
Sample
d415ac0228ea90dfab9f6e75f03ffc1af9ad1dc69cb70d026c6760f82b0cb2bb.exe
Resource
win10v2004-20221111-en
General
-
Target
d415ac0228ea90dfab9f6e75f03ffc1af9ad1dc69cb70d026c6760f82b0cb2bb
-
Size
1.1MB
-
MD5
dcc329d4a1ca1da76e9d4fedcecb45bc
-
SHA1
55656da4b5f8d428346c210a3f14932251c9c876
-
SHA256
d415ac0228ea90dfab9f6e75f03ffc1af9ad1dc69cb70d026c6760f82b0cb2bb
-
SHA512
db53399dbffa449241639a9b5bdcf3e579bc84f317bb914b3bc5699682f5fc9acb68897e8a146e9ebe99bd2af5f5293ec745d550b847bbbf136b84c2d31669d5
-
SSDEEP
24576:CVM/zbtMWqK9JZE4viQVKt2VKqFZEKsxQr3awMMdEgFJ4AB:CC1M69c6iQVE2VK0gQr3eMOgFiS
Malware Config
Signatures
Files
-
d415ac0228ea90dfab9f6e75f03ffc1af9ad1dc69cb70d026c6760f82b0cb2bb.exe windows x86
6debacaaafe842430a87abfc0fab4865
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtect
GetConsoleAliasA
SetComputerNameA
GetSystemWindowsDirectoryW
GlobalUnlock
FindFirstVolumeMountPointW
CreateDirectoryExW
DeleteAtom
GetLogicalDriveStringsW
ReadConsoleInputW
GetTempPathW
GetCurrentDirectoryW
WaitForDebugEvent
LCMapStringW
GetProcAddress
GetModuleHandleA
LocalAlloc
GetBinaryTypeA
SearchPathW
VerifyVersionInfoW
GetHandleInformation
EndUpdateResourceW
FindNextFileA
CreateFileW
LoadLibraryW
GlobalFlags
CopyFileA
CreateActCtxW
lstrlenA
UpdateResourceA
CreateActCtxA
DeleteVolumeMountPointA
MoveFileWithProgressA
CreateMailslotA
WriteConsoleInputW
InterlockedExchangeAdd
EnumTimeFormatsA
SetFileValidData
FindFirstFileW
FreeEnvironmentStringsA
GlobalAlloc
GetTickCount
SetLastError
GetPrivateProfileStructA
CopyFileExW
CreateFileA
GetConsoleTitleW
GetCommMask
GetNumberOfConsoleInputEvents
CompareStringA
FindFirstVolumeA
LoadLibraryA
HeapSize
WriteConsoleW
MultiByteToWideChar
GetLastError
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
DeleteFileA
GetStartupInfoW
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapFree
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
CloseHandle
HeapAlloc
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
RaiseException
VirtualAlloc
HeapReAlloc
LCMapStringA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RtlUnwind
InitializeCriticalSectionAndSpinCount
WriteConsoleA
GetConsoleOutputCP
user32
GetMenuInfo
gdi32
GetCharWidth32A
GetCharABCWidthsA
GetColorAdjustment
GetTextFaceW
GetBrushOrgEx
winhttp
WinHttpSetOption
Sections
.text Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 905KB - Virtual size: 40.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 111KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ