Static task
static1
Behavioral task
behavioral1
Sample
3098e6e7ae23b3b8637677da7bfc0ba720e557e6df71fa54a8ef1579b6746061.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3098e6e7ae23b3b8637677da7bfc0ba720e557e6df71fa54a8ef1579b6746061.exe
Resource
win10v2004-20220812-en
General
-
Target
3098e6e7ae23b3b8637677da7bfc0ba720e557e6df71fa54a8ef1579b6746061
-
Size
140KB
-
MD5
1ffccc23fef2964e9b1747098c19d956
-
SHA1
a100daa33d7db6d2424ac1a8c9ec4b3ae8a3105c
-
SHA256
3098e6e7ae23b3b8637677da7bfc0ba720e557e6df71fa54a8ef1579b6746061
-
SHA512
f7de90938e3b97880e524506828d5fca0c7ab770b59aa0d8361b1761d25e3a80bb85fc7ddb300379315c8d3f3d2fe1fa59339e91b9180aab5523ce23c94fbe63
-
SSDEEP
3072:QRJKdwPHuGj5JyOMhZleupcr776bScyicbYDWIG43aOvSK:S0w5yOMnTpcrf4l/oYs
Malware Config
Signatures
Files
-
3098e6e7ae23b3b8637677da7bfc0ba720e557e6df71fa54a8ef1579b6746061.exe windows x64
0f5fc47d8bdbdd3a7fd1dff401388a5e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
ReadFile
GetLogicalDrives
FindFirstFileW
FindNextFileW
FindClose
LocalAlloc
CreateFileW
GetFileAttributesW
GetDiskFreeSpaceExW
DeleteFileW
LocalSize
LocalFree
GetFileSize
LocalReAlloc
GetDriveTypeW
GetComputerNameW
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
TerminateProcess
CreatePipe
PeekNamedPipe
GetSystemDirectoryW
CreateProcessW
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
GetConsoleCP
HeapReAlloc
HeapSize
CreateDirectoryW
WaitForSingleObject
WideCharToMultiByte
MultiByteToWideChar
CreateFileA
GetTempPathA
WriteFile
GetModuleFileNameA
DeleteCriticalSection
CreateThread
CloseHandle
Sleep
InitializeCriticalSection
GetProcessHeap
SetStdHandle
LCMapStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
GetStringTypeW
GetFileType
WriteConsoleW
HeapAlloc
HeapFree
GetACP
GetModuleHandleExW
ExitProcess
GetStdHandle
LoadLibraryExW
GetProcAddress
FreeLibrary
LeaveCriticalSection
EnterCriticalSection
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlPcToFileHeader
RaiseException
RtlUnwindEx
GetLastError
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
user32
GetDesktopWindow
ReleaseDC
wsprintfW
GetForegroundWindow
GetDC
GetWindowInfo
gdi32
DeleteDC
CreateCompatibleDC
BitBlt
CreateCompatibleBitmap
SelectObject
GetDIBits
DeleteObject
advapi32
GetUserNameW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
shell32
ShellExecuteA
SHGetFileInfoW
ole32
CoSetProxyBlanket
CoInitializeSecurity
CoInitializeEx
CreateStreamOnHGlobal
CoCreateInstance
CoUninitialize
oleaut32
SysAllocString
SysFreeString
VariantInit
ws2_32
closesocket
gethostbyname
WSACleanup
WSAStartup
send
socket
connect
recv
htons
shutdown
WSAIoctl
setsockopt
gdiplus
GdipSaveImageToStream
GdipGetImageEncodersSize
GdipFree
GdipDisposeImage
GdipAlloc
GdipCloneImage
GdipGetImageEncoders
GdiplusShutdown
GdiplusStartup
GdipLoadImageFromStream
iphlpapi
GetAdaptersInfo
Sections
.text Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ