Static task
static1
Behavioral task
behavioral1
Sample
f8280593a2b0675b0cf5ab201457706593cc5fb6c6c789632825e578db8acd50.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f8280593a2b0675b0cf5ab201457706593cc5fb6c6c789632825e578db8acd50.exe
Resource
win10v2004-20221111-en
General
-
Target
f8280593a2b0675b0cf5ab201457706593cc5fb6c6c789632825e578db8acd50.exe
-
Size
186KB
-
MD5
02510c07c0ab1f6099280c9cebcf645a
-
SHA1
9012536f8919558e35b1a07954e5796cf09faba0
-
SHA256
f8280593a2b0675b0cf5ab201457706593cc5fb6c6c789632825e578db8acd50
-
SHA512
ca52868af009dd32f37486e30f5d5ae02c45ed844bb1e7e97401c5576911b9e342f9bedb6a59c546e778cae240947000f4c2a4d5c1d188adcb370a914d23550e
-
SSDEEP
3072:0XEzw8o0JRXI4OBlH05haQl81X940x+hQhYKzA0Any2CPa:w98poBlHMaQlM94Fmsjy2C
Malware Config
Signatures
Files
-
f8280593a2b0675b0cf5ab201457706593cc5fb6c6c789632825e578db8acd50.exe.exe windows x86
9c1a4a6c7fc0c3ab02a26e7bf3b91fdf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleAliasA
CreateFileW
GetSystemWindowsDirectoryW
GlobalHandle
FindFirstVolumeMountPointA
CreateDirectoryExA
ReleaseActCtx
GetLogicalDriveStringsA
ReadConsoleInputW
GetComputerNameExA
GetTempPathA
GetCurrentDirectoryA
DebugBreak
LCMapStringA
GetProcAddress
GlobalAlloc
IsDebuggerPresent
FindActCtxSectionStringA
GetLastError
LoadLibraryW
CreateNamedPipeA
GlobalFlags
GetModuleHandleA
GetConsoleAliasesLengthW
GetVolumeNameForVolumeMountPointA
GetVolumePathNameW
GetProcessPriorityBoost
OpenFileMappingW
lstrcmpW
AddRefActCtx
SetConsoleScreenBufferSize
GetComputerNameA
lstrcpynA
lstrcpyW
lstrcatA
GenerateConsoleCtrlEvent
DeleteFileW
DosDateTimeToFileTime
lstrlenA
TlsGetValue
CreateActCtxW
DeleteVolumeMountPointW
MoveFileWithProgressA
ResetEvent
CreateMailslotA
WriteConsoleInputW
GetTempPathW
InterlockedCompareExchange
EnumTimeFormatsA
FindNextFileA
VerifyVersionInfoW
GetConsoleAliasW
CreateFileA
GetNumberOfConsoleInputEvents
GetConsoleTitleW
ProcessIdToSessionId
LoadLibraryA
MultiByteToWideChar
WideCharToMultiByte
HeapReAlloc
HeapAlloc
GetCommandLineA
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapFree
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
CloseHandle
DeleteCriticalSection
HeapCreate
VirtualFree
VirtualAlloc
SetHandleCount
GetStdHandle
GetFileType
Sleep
ExitProcess
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RaiseException
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RtlUnwind
InitializeCriticalSectionAndSpinCount
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
ReadFile
HeapSize
DeleteFileA
gdi32
GetColorAdjustment
GetBrushOrgEx
advapi32
SetThreadToken
msimg32
TransparentBlt
Sections
.text Size: 93KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 80KB - Virtual size: 39.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ