Static task
static1
Behavioral task
behavioral1
Sample
31e62c4755aeb160f99d2e64fd4888cbcfa5293ac77788ee7c51097aeb12363e.exe
Resource
win10v2004-20221111-en
General
-
Target
31e62c4755aeb160f99d2e64fd4888cbcfa5293ac77788ee7c51097aeb12363e
-
Size
262KB
-
MD5
734162ab49f90ab7322b487dc5f83086
-
SHA1
4a016c248a82092b9c8a691a5684f5e0345eff34
-
SHA256
31e62c4755aeb160f99d2e64fd4888cbcfa5293ac77788ee7c51097aeb12363e
-
SHA512
22e9d193f3eaa763d34a84462123d63792aa196148eb7e40f1b3d07c54c8a4059c47d1573bbefed7e0f3b83e3c1b6c6b04289e4a50206ea6073ba896826966c6
-
SSDEEP
6144:BT4uLm8aS+uNxNgCcVoKFQRdZqeNGpMskFQH2Yp:V4ui8airxnKCRKeURkFo2Y
Malware Config
Signatures
Files
-
31e62c4755aeb160f99d2e64fd4888cbcfa5293ac77788ee7c51097aeb12363e.exe windows x86
060d17800c4ce70fe36e9f82e5d5defa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtect
GetConsoleAliasA
SetComputerNameA
GetSystemWindowsDirectoryW
GlobalUnlock
FindFirstVolumeMountPointW
CreateDirectoryExW
DeleteAtom
GetLogicalDriveStringsW
ReadConsoleInputW
GetTempPathW
GetCurrentDirectoryW
WaitForDebugEvent
LCMapStringA
GetProcAddress
GetModuleHandleA
LocalAlloc
GetBinaryTypeA
SearchPathW
VerifyVersionInfoW
GetHandleInformation
EndUpdateResourceW
FindNextFileA
CreateFileW
LoadLibraryW
GlobalFlags
CopyFileA
CreateActCtxW
lstrlenA
UpdateResourceA
CreateActCtxA
DeleteVolumeMountPointA
MoveFileWithProgressA
CreateMailslotA
WriteConsoleInputW
InterlockedExchangeAdd
EnumTimeFormatsA
SetFileValidData
FindFirstFileW
FreeEnvironmentStringsA
GetTickCount
SetLastError
GetPrivateProfileStructA
GetLastError
CopyFileExW
CreateFileA
GetConsoleTitleW
GetCommMask
GetNumberOfConsoleInputEvents
CompareStringA
FindFirstVolumeA
LoadLibraryA
HeapSize
WriteConsoleW
MultiByteToWideChar
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
DeleteFileA
GetStartupInfoW
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapFree
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
CloseHandle
HeapAlloc
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
RaiseException
VirtualAlloc
HeapReAlloc
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RtlUnwind
InitializeCriticalSectionAndSpinCount
WriteConsoleA
GetConsoleOutputCP
user32
GetMenuInfo
gdi32
GetCharWidth32A
GetCharABCWidthsA
GetColorAdjustment
GetTextFaceW
GetBrushOrgEx
winhttp
WinHttpSetOption
Sections
.text Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 71KB - Virtual size: 39.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 106KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ