Static task
static1
Behavioral task
behavioral1
Sample
5be745173bb53b570095e4098f94ddb235792a80c878f4f4a4f4d2d9431abd72.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5be745173bb53b570095e4098f94ddb235792a80c878f4f4a4f4d2d9431abd72.exe
Resource
win10v2004-20220812-en
General
-
Target
5be745173bb53b570095e4098f94ddb235792a80c878f4f4a4f4d2d9431abd72
-
Size
110KB
-
MD5
d6c31e28f25c1a85f79cf1749da12d79
-
SHA1
d1c270ca7155127a896a079af668b59a410c3290
-
SHA256
5be745173bb53b570095e4098f94ddb235792a80c878f4f4a4f4d2d9431abd72
-
SHA512
b82802ca9d0f679d45589675e6b598008e10eb84dbdfb2d561c09dfc98d33e0211815a9324cc27a25758c18f7e82571513908aa730419e16287f933bfcfc50a3
-
SSDEEP
1536:xXj2MBb4v1sAEIP/1jw1lOdohFDS0CPOOPllzUlnxWKN4LPfMp5c:xXjDCvehI+BhFDSKSUiQ4LPfM4
Malware Config
Signatures
Files
-
5be745173bb53b570095e4098f94ddb235792a80c878f4f4a4f4d2d9431abd72.exe windows x86
2650a2b8e0a8345d2d7ebc4e9beaaf33
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
InterlockedDecrement
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
GetConsoleCP
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapFree
Sleep
MultiByteToWideChar
InterlockedExchange
LoadLibraryW
RtlUnwind
SetStdHandle
WriteConsoleW
LCMapStringW
GetStringTypeW
HeapAlloc
HeapReAlloc
IsProcessorFeaturePresent
HeapSize
CreateFileW
FlushFileBuffers
MapViewOfFile
UnmapViewOfFile
GlobalAlloc
RaiseException
GlobalFree
OpenFileMappingA
GlobalReAlloc
lstrlenA
lstrcpynA
lstrcatA
lstrlenW
WaitForSingleObject
WriteFile
CreateFileA
GetModuleFileNameW
ReadFile
Thread32First
Thread32Next
VirtualProtect
CreateToolhelp32Snapshot
GetThreadContext
SetThreadContext
InterlockedCompareExchange
FlushInstructionCache
OpenThread
SuspendThread
ResumeThread
VirtualFree
VirtualAlloc
VirtualQuery
ExitProcess
GetModuleHandleW
EncodePointer
DecodePointer
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoW
HeapSetInformation
GetCommandLineA
GetFileSize
GetStdHandle
GetTimeZoneInformation
CompareStringW
CreateThread
CloseHandle
OpenProcess
lstrcmpiA
GetTickCount64
GetTickCount
LoadLibraryA
GetProcAddress
SetEvent
FreeLibrary
SetEnvironmentVariableA
user32
SendDlgItemMessageA
GetMessageW
TranslateAcceleratorW
SetWindowLongW
SendMessageTimeoutW
CreateDialogParamW
IsWindow
GetWindowThreadProcessId
DispatchMessageW
GetClassNameA
PostMessageW
SendMessageA
EnumWindows
TranslateMessage
LoadAcceleratorsW
KillTimer
PostQuitMessage
SetTimer
DestroyWindow
SendMessageTimeoutA
FindWindowExA
MessageBoxA
shell32
ShellExecuteExA
Sections
.text Size: 77KB - Virtual size: 77KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 584B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ