Static task
static1
Behavioral task
behavioral1
Sample
694f015960fad0dfae6d315f2ae8cc7b6ae1e80d0983f2422f5b6d41f40e2dd6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
694f015960fad0dfae6d315f2ae8cc7b6ae1e80d0983f2422f5b6d41f40e2dd6.exe
Resource
win10v2004-20220812-en
General
-
Target
694f015960fad0dfae6d315f2ae8cc7b6ae1e80d0983f2422f5b6d41f40e2dd6
-
Size
201KB
-
MD5
d7bf2816a4fea8f093518b7060f4ce12
-
SHA1
a5af37c6eb8ad110e490658ff96276ef31f29b57
-
SHA256
694f015960fad0dfae6d315f2ae8cc7b6ae1e80d0983f2422f5b6d41f40e2dd6
-
SHA512
1bd745aeee6f56606407fec7308324dbef6ad526b0763a94f4750d7b15b897df8ac40c975bf54297dca7f8900e49d79473f4dccf7a5915d596b5b7cf614f35d9
-
SSDEEP
3072:5j7wwkk0MFE2flH5jxMG06QZf1rGJJaRVVciZrgdUZfbyk0dCtFg76zt:5jnLRK0CbyLdCf
Malware Config
Signatures
Files
-
694f015960fad0dfae6d315f2ae8cc7b6ae1e80d0983f2422f5b6d41f40e2dd6.exe windows x64
a3d4116e085b088e269f0e5f9b2ea0e4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetLocalTime
WriteFile
VerifyVersionInfoW
VerSetConditionMask
MapViewOfFileEx
GetLastError
GetCurrentThreadId
CreateFileMappingW
LoadLibraryW
GetProcAddress
WaitForSingleObject
UnmapViewOfFile
CloseHandle
HeapDestroy
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
GetProcessHeap
InitializeCriticalSectionEx
DeleteCriticalSection
OutputDebugStringW
RaiseException
EnterCriticalSection
LeaveCriticalSection
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
IsDebuggerPresent
GetModuleHandleW
LoadLibraryExA
FreeLibrary
VirtualQuery
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
GetSystemInfo
VirtualProtect
user32
DispatchMessageW
wvsprintfA
PostMessageW
PostQuitMessage
CallNextHookEx
SetProcessDPIAware
PeekMessageW
MessageBoxW
GetKeyboardLayout
GetKeyState
ChangeWindowMessageFilter
UnhookWindowsHookEx
MapVirtualKeyExW
GetMessageW
SetTimer
SetWindowsHookExW
ole32
CoInitializeEx
vcruntime140_1
__CxxFrameHandler4
vcruntime140
_CxxThrowException
memmove
memset
__C_specific_handler
__current_exception
memcpy
__current_exception_context
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vsprintf
_set_fmode
__p__commode
__stdio_common_vswprintf
api-ms-win-crt-runtime-l1-1-0
terminate
_get_wide_winmain_command_line
_initialize_wide_environment
_c_exit
__p___argc
_register_thread_local_exe_atexit_callback
_set_app_type
_seh_filter_exe
_cexit
_crt_atexit
_register_onexit_function
_initialize_onexit_table
_exit
_errno
_invalid_parameter_noinfo
exit
__p___wargv
_initterm_e
_configure_wide_argv
_initterm
api-ms-win-crt-locale-l1-1-0
setlocale
_configthreadlocale
api-ms-win-crt-convert-l1-1-0
_wtoll
_wtoi64
api-ms-win-crt-heap-l1-1-0
free
_set_new_mode
api-ms-win-crt-math-l1-1-0
__setusermatherr
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 174KB - Virtual size: 174KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ