Static task
static1
Behavioral task
behavioral1
Sample
1a67e4c1f68cdcbf3118a3714b2a93dcbcc1c2eab3ea660bce5106ab207d776a.exe
Resource
win10v2004-20221111-en
General
-
Target
1a67e4c1f68cdcbf3118a3714b2a93dcbcc1c2eab3ea660bce5106ab207d776a
-
Size
268KB
-
MD5
b1831beec5c39b913c2e2bcf7e118672
-
SHA1
d4096c02f1a94e4314bdc74f6ef81b0d56e1e95f
-
SHA256
1a67e4c1f68cdcbf3118a3714b2a93dcbcc1c2eab3ea660bce5106ab207d776a
-
SHA512
8ebc040c1280461edec3921480d343a54b5abc9ea5b6350172a3ef22048b0c3fe0572ef8a04f833a79a1a832021579276fd8784f5d167ac82b84c5c5119800d2
-
SSDEEP
6144:Bap5L4EaqUuBR7vW3fgpwKXymWCxjFQRdTNGpMskFQH2Yp:Ep5naq/a3fgOMSiCR5URkFo2Y
Malware Config
Signatures
Files
-
1a67e4c1f68cdcbf3118a3714b2a93dcbcc1c2eab3ea660bce5106ab207d776a.exe windows x86
060d17800c4ce70fe36e9f82e5d5defa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtect
GetConsoleAliasA
SetComputerNameA
GetSystemWindowsDirectoryW
GlobalUnlock
FindFirstVolumeMountPointW
CreateDirectoryExW
DeleteAtom
GetLogicalDriveStringsW
ReadConsoleInputW
GetTempPathW
GetCurrentDirectoryW
WaitForDebugEvent
LCMapStringA
GetProcAddress
GetModuleHandleA
LocalAlloc
GetBinaryTypeA
SearchPathW
VerifyVersionInfoW
GetHandleInformation
EndUpdateResourceW
FindNextFileA
CreateFileW
LoadLibraryW
GlobalFlags
CopyFileA
CreateActCtxW
lstrlenA
UpdateResourceA
CreateActCtxA
DeleteVolumeMountPointA
MoveFileWithProgressA
CreateMailslotA
WriteConsoleInputW
InterlockedExchangeAdd
EnumTimeFormatsA
SetFileValidData
FindFirstFileW
FreeEnvironmentStringsA
GetTickCount
SetLastError
GetPrivateProfileStructA
GetLastError
CopyFileExW
CreateFileA
GetConsoleTitleW
GetCommMask
GetNumberOfConsoleInputEvents
CompareStringA
FindFirstVolumeA
LoadLibraryA
HeapSize
WriteConsoleW
MultiByteToWideChar
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
DeleteFileA
GetStartupInfoW
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapFree
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
CloseHandle
HeapAlloc
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
RaiseException
VirtualAlloc
HeapReAlloc
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RtlUnwind
InitializeCriticalSectionAndSpinCount
WriteConsoleA
GetConsoleOutputCP
user32
GetMenuInfo
gdi32
GetCharWidth32A
GetCharABCWidthsA
GetColorAdjustment
GetTextFaceW
GetBrushOrgEx
winhttp
WinHttpSetOption
Sections
.text Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 71KB - Virtual size: 39.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 111KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ