Static task
static1
Behavioral task
behavioral1
Sample
53ad1e361602477cc0c2f971444415678bd23c741518bdb492e5610ea787d250.exe
Resource
win10v2004-20230220-en
General
-
Target
53ad1e361602477cc0c2f971444415678bd23c741518bdb492e5610ea787d250
-
Size
676KB
-
MD5
3a02e44029ea6e83d55d28f386addd12
-
SHA1
117eac938bffbfeb4b8c7c2c56a127e62c10b904
-
SHA256
53ad1e361602477cc0c2f971444415678bd23c741518bdb492e5610ea787d250
-
SHA512
ba7fa20a7707f2c4f291bc75999e93307d28a621f978e2a1a5d2a0f1a1b47f8f530741aeedd91b9ce4f7b5ca8fc0c6d08d8bbeda4e06d742486aac6dc6b1435b
-
SSDEEP
12288:Ti+aKKg0nii3SacHtrlJducyjogDsT+0qC0ddlnhVPnMRaJ/Rl2ME+:Tii6nt3Lcl7scqVgS6YVfhPt
Malware Config
Signatures
Files
-
53ad1e361602477cc0c2f971444415678bd23c741518bdb492e5610ea787d250.exe windows x86
3b9c426a6fdec2cb62dc7c138a0d2616
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileW
GetWindowsDirectoryA
FindFirstVolumeMountPointW
FindFirstChangeNotificationA
WaitForSingleObject
ReadConsoleInputW
VerifyVersionInfoA
GetVersionExA
GetCurrentProcess
OpenEventA
CreateFileMappingW
SetLocaleInfoW
GetProcAddress
GlobalAlloc
GetConsoleTitleW
DeleteFileA
FindResourceW
GetLongPathNameA
GetBinaryTypeA
SetLastError
GetProfileSectionA
WriteProfileStringW
GetComputerNameExW
GetConsoleMode
WriteProfileSectionW
SetVolumeMountPointA
EnumResourceLanguagesA
CommConfigDialogA
EnumDateFormatsA
DeleteVolumeMountPointA
GetModuleHandleA
ZombifyActCtx
WritePrivateProfileStringW
GetSystemDirectoryA
GetStringTypeW
GetShortPathNameW
EnumCalendarInfoA
VerifyVersionInfoW
EnumCalendarInfoW
FindNextFileW
ReleaseActCtx
BuildCommDCBAndTimeoutsA
GetCurrentActCtx
FindFirstFileW
WriteConsoleW
GetConsoleAliasA
LoadLibraryA
HeapReAlloc
MultiByteToWideChar
RaiseException
RtlUnwind
GetLastError
HeapFree
GetCommandLineW
HeapSetInformation
GetStartupInfoW
EncodePointer
DecodePointer
IsProcessorFeaturePresent
HeapAlloc
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetModuleHandleW
GetCurrentThreadId
InterlockedDecrement
CloseHandle
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
EnterCriticalSection
LeaveCriticalSection
HeapCreate
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
Sleep
HeapSize
SetStdHandle
WideCharToMultiByte
GetConsoleCP
FlushFileBuffers
LoadLibraryW
LCMapStringW
SetFilePointer
user32
LoadMenuA
GetMessagePos
advapi32
RevertToSelf
shell32
FindExecutableW
ole32
CoGetInstanceFromFile
Sections
.text Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 585KB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ