Static task
static1
Behavioral task
behavioral1
Sample
76d76f388da2edd9694885a751ce64a3d6090f018e540717cc46558b5b65c919.exe
Resource
win10-20220812-en
General
-
Target
76d76f388da2edd9694885a751ce64a3d6090f018e540717cc46558b5b65c919
-
Size
179KB
-
MD5
f711fb8b053f0fa16936e7e4bfe5b95a
-
SHA1
cf988ac9f042f9e7e3ff0bdb0a9738145b49457f
-
SHA256
76d76f388da2edd9694885a751ce64a3d6090f018e540717cc46558b5b65c919
-
SHA512
85aa9964576eb0ff66a83efa7a3cd6e04ecef49d78f4188bd0d0ab85dc808749cc8a14ef597d2b2317176cb11f91b4b56487dc80207a028a3a982cd4db3fb33d
-
SSDEEP
3072:HoGSLEOy5n/Blf1axkbcfI5mmuedH1v0zS:IFLEOIXNaxLIhueLvF
Malware Config
Signatures
Files
-
76d76f388da2edd9694885a751ce64a3d6090f018e540717cc46558b5b65c919.exe windows x86
798e86ce43c6c756580e060a65d134f9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetMailslotInfo
GetModuleHandleW
GetTickCount
GetCommConfig
GetCurrentThread
GetNumberFormatA
GetGeoInfoW
GlobalAlloc
GetSystemDirectoryW
LoadLibraryW
ReadConsoleInputA
DeleteVolumeMountPointW
HeapCreate
GetBinaryTypeA
GetMailslotInfo
CreateActCtxA
GetStartupInfoA
FillConsoleOutputCharacterW
GetLastError
GetProcAddress
VirtualAlloc
DisableThreadLibraryCalls
ProcessIdToSessionId
GetProcessWorkingSetSize
CreateEventW
GetNumberOfConsoleMouseButtons
FindFirstChangeNotificationA
HeapSetInformation
FreeEnvironmentStringsW
GetConsoleTitleW
RequestWakeupLatency
GetFileAttributesExW
GetVersionExA
FileTimeToLocalFileTime
GetCurrentProcessId
MoveFileWithProgressW
GetTempPathA
ReadConsoleOutputCharacterW
LCMapStringW
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
CopyFileExW
InterlockedIncrement
RemoveDirectoryW
MultiByteToWideChar
WideCharToMultiByte
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
RaiseException
RtlUnwind
HeapAlloc
HeapFree
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
InterlockedDecrement
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
DeleteCriticalSection
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
LoadLibraryA
InitializeCriticalSectionAndSpinCount
LCMapStringA
user32
IsCharAlphaNumericA
RealGetWindowClassW
RealChildWindowFromPoint
IsChild
NotifyWinEvent
LoadMenuA
GetCursorInfo
CharUpperW
CharLowerBuffA
ClipCursor
GetKeyNameTextW
advapi32
LogonUserW
ReportEventA
IsValidAcl
ole32
CoRegisterMallocSpy
Sections
.text Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 87KB - Virtual size: 3.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ