Static task
static1
Behavioral task
behavioral1
Sample
e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe
Resource
win10v2004-20221111-en
General
-
Target
e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88
-
Size
3.9MB
-
MD5
4f22f6d197f336b668b31e2470c2c857
-
SHA1
c96ebad60609561a1fc8f6e8dc78612b39145110
-
SHA256
e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88
-
SHA512
616c93a8f0b254c624c53fbe1c1f984e79e5c71ecc05a52c8003410317411bb2d49fe8cfc0bb3680a3707ceaf65ddacf0a452334a32fa195b773f8deeb057970
-
SSDEEP
98304:UBw7WMYDTw7yg83ISWR8Ku4TBzFEO6aVSi3GHm7Z:U20+7S1Ku4TBVSiB7Z
Malware Config
Signatures
Files
-
e4148bfa1147a6062d657cae12b65df994f10328acb441045f9f3cd68dd81f88.exe windows x86
113ab027842a74f801bdc92a0f80850f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleExA
SetEndOfFile
FindResourceW
MapUserPhysicalPages
LoadResource
HeapAlloc
LoadLibraryExW
InterlockedIncrement
ZombifyActCtx
CreateDirectoryW
LockFile
GetModuleHandleW
GetTickCount
GenerateConsoleCtrlEvent
GetConsoleAliasesA
ReadConsoleOutputA
GetLocaleInfoW
GetFileAttributesA
GetTimeFormatW
HeapValidate
SetConsoleCursorPosition
GetFileAttributesW
GetAtomNameW
GetCompressedFileSizeA
lstrcatA
ExitThread
FindNextVolumeMountPointW
CreateJobObjectA
GetProcAddress
CreateTimerQueueTimer
LocalAlloc
SetConsoleOutputCP
VirtualLock
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetModuleFileNameW
RaiseException
EncodePointer
DecodePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
IsBadReadPtr
InitializeCriticalSectionAndSpinCount
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetLastError
HeapCreate
WriteFile
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
LoadLibraryW
SetFilePointer
GetConsoleCP
GetConsoleMode
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
HeapReAlloc
HeapSize
HeapQueryInformation
HeapFree
MultiByteToWideChar
RtlUnwind
SetStdHandle
GetStringTypeW
LCMapStringW
CreateFileW
CloseHandle
FlushFileBuffers
Sections
.text Size: 113KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3.7MB - Virtual size: 7.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ropay Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gosivuy Size: 512B - Virtual size: 377B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 42KB - Virtual size: 305KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ