Static task
static1
Behavioral task
behavioral1
Sample
585dc08713bd5c4993f82372fab19124.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
585dc08713bd5c4993f82372fab19124.exe
Resource
win10v2004-20220812-en
General
-
Target
585dc08713bd5c4993f82372fab19124.exe
-
Size
1.3MB
-
MD5
585dc08713bd5c4993f82372fab19124
-
SHA1
169052f8e80bf3858f8b744a2a591622b64fbf91
-
SHA256
46db2cb734082006aa792fac99e35f17a012b0ca0d530563d5fe2a2d30a996b4
-
SHA512
5f59eeb8acef6e2ca52876dc2e986a0b130ec2c160d57d77cdea22531c15062d8b3eb72d1e3763d47d28b307d2ca023a2428753b57bf494827a833acbbd543f6
-
SSDEEP
24576:SlxObwiWk8Ty80JGTom2s8iQ+FVu1YteAqE9DpQGjl314ZD3bQ2jgcMFS:SlgwXm8PMEb5F4IeAvUGhF4l02oF
Malware Config
Signatures
Files
-
585dc08713bd5c4993f82372fab19124.exe.exe windows x64
edc6c3de5dcea9514b11905219670b4c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetCurrentProcess
ReadFile
SetFilePointerEx
OpenProcess
GetModuleHandleA
FreeLibrary
GetProcAddress
LoadLibraryA
SetLastError
WriteFile
GetFileSizeEx
CreateFileA
GetSystemDirectoryA
Sleep
GetTickCount
GetCurrentThread
WaitForSingleObject
GetCurrentProcessId
GetModuleFileNameA
WideCharToMultiByte
CloseHandle
HeapReAlloc
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
HeapSize
SetStdHandle
InitializeCriticalSectionAndSpinCount
GetConsoleMode
GetConsoleCP
LCMapStringW
MultiByteToWideChar
DeviceIoControl
GetLastError
GetNativeSystemInfo
VirtualQuery
FreeResource
LockResource
LoadResource
SizeofResource
FindResourceA
FlushFileBuffers
SetEndOfFile
SetFileAttributesA
GetModuleHandleW
GetExitCodeProcess
CreateProcessA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetFileAttributesA
DeleteFileA
GetTempFileNameA
GlobalFree
FindClose
FindNextFileA
FindFirstFileA
GlobalAlloc
GetWindowsDirectoryA
GetPrivateProfileStringA
GetCurrentThreadId
VirtualFree
VirtualAlloc
OpenMutexA
GetTempPathA
CreateDirectoryA
TerminateProcess
SystemTimeToFileTime
LocalFileTimeToFileTime
CreateMutexA
GetVersionExA
CopyFileA
MoveFileExA
MoveFileA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetComputerNameA
HeapFree
HeapAlloc
GetCommandLineA
GetStartupInfoA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
RtlUnwindEx
HeapSetInformation
HeapCreate
ExitProcess
GetStdHandle
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetFileType
DeleteCriticalSection
SetFilePointer
EncodePointer
DecodePointer
FlsGetValue
FlsSetValue
FlsFree
FlsAlloc
RaiseException
RtlPcToFileHeader
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
LCMapStringA
ws2_32
recv
select
connect
shutdown
send
inet_addr
WSAGetLastError
socket
htons
setsockopt
sendto
recvfrom
closesocket
WSACleanup
gethostbyaddr
WSAStartup
gethostbyname
psapi
GetModuleBaseNameA
shlwapi
PathFileExistsA
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
iphlpapi
SendARP
GetAdaptersInfo
user32
FindWindowExA
advapi32
RegDeleteKeyA
CreateProcessAsUserA
DuplicateTokenEx
OpenProcessToken
shell32
SHGetSpecialFolderPathA
Sections
.text Size: 139KB - Virtual size: 139KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 618B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ