Static task
static1
Behavioral task
behavioral1
Sample
5OfdG.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5OfdG.exe
Resource
win10v2004-20221111-en
General
-
Target
5OfdG.exe
-
Size
260KB
-
MD5
083c6c05ac5875d0b6e997e894ca07bc
-
SHA1
69d0116998e8a70db5852fccb86d45975ce88a9a
-
SHA256
03aefd40698cafbd48138784f362fb9a36f726fb50f262ca40695729f7b553ca
-
SHA512
fb0b9994f9ddadd825476ed19a8299ef90536dae58b4f3087145ca4033a63d4ae0da944ac8bf4e71324e1b63af755ab1d82019e55de6377b00c9812ed57f3fdf
-
SSDEEP
3072:EAhPo1O3uPxn1aN+NYzoJb61Xe+VUNQRHcpfqbqM8TwxAwcvTQ5pP3YNoNBWPWw4:xhPZEncAOEJb/WyIxAwt5pfYNoNoS
Malware Config
Signatures
Files
-
5OfdG.exe.exe windows x64
20a1f6a8b247fd5104863c0ec04e85cc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
DeleteFileW
GetCommandLineW
GetSystemInfo
GetModuleHandleW
GetFirmwareEnvironmentVariableW
WriteConsoleW
HeapSetInformation
VirtualLock
VirtualUnlock
SetLastError
Sleep
VirtualAlloc
VirtualFree
GetCurrentProcessId
GetLastError
CreateFileW
CloseHandle
HeapReAlloc
HeapSize
SetFilePointerEx
GetFileSizeEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetProcessHeap
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetFileType
LCMapStringW
CompareStringW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
RtlUnwindEx
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
RaiseException
GetStdHandle
WriteFile
GetModuleFileNameW
GetCurrentProcess
ExitProcess
TerminateProcess
GetModuleHandleExW
GetCommandLineA
HeapAlloc
HeapFree
advapi32
RegCreateKeyExW
RegEnumKeyExW
RegSetValueExW
RegOpenKeyExW
RegSetKeyValueW
RegCloseKey
RegOpenKeyW
RegDeleteKeyW
ntdll
NtLoadDriver
RtlSetLastWin32Error
NtCreateFile
RtlInitString
RtlFreeHeap
NtQueryDirectoryObject
RtlExpandEnvironmentStrings
NtOpenDirectoryObject
NtFlushBuffersFile
LdrFindResource_U
RtlDosPathNameToNtPathName_U
LdrAccessResource
NtUnloadDriver
NtWriteFile
NtQuerySystemInformation
RtlAllocateHeap
LdrGetProcedureAddress
NtOpenProcessToken
NtAdjustPrivilegesToken
NtOpenProcess
RtlDoesFileExists_U
RtlGetVersion
RtlNtStatusToDosError
NtDeviceIoControlFile
NtClose
RtlImageNtHeader
LdrLoadDll
RtlInitUnicodeString
RtlFreeUnicodeString
msdelta
ApplyDeltaB
DeltaFree
Sections
.text Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
iris Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ