Static task
static1
Behavioral task
behavioral1
Sample
d799578935e0027935cd62d3f499592ef5be47dcf7f5dd31e2f0f915d98490c5.exe
Resource
win10-20230220-en
General
-
Target
d799578935e0027935cd62d3f499592ef5be47dcf7f5dd31e2f0f915d98490c5
-
Size
213KB
-
MD5
77df036ecc85c3fc827a597835bb154f
-
SHA1
59b5795d86c5484928642e46aeb7c53a8bfbc2ed
-
SHA256
d799578935e0027935cd62d3f499592ef5be47dcf7f5dd31e2f0f915d98490c5
-
SHA512
c9e68429229c32ed54538d27a957a66fa64bbc71d19d39752a447897cb1e6172f0df78fd4234f0f2fab179ce5ab2b3ae7b64a4ee46675d8de8c1eb73ef995068
-
SSDEEP
3072:NLNO/LZ5YYfd1ENH397h2mMQs1wIdSTe8Yz3n2/n+vJtcEPKOdPdR:jqLpfdqNVDhs1v8m2/crcEPbdR
Malware Config
Signatures
Files
-
d799578935e0027935cd62d3f499592ef5be47dcf7f5dd31e2f0f915d98490c5.exe windows x86
60260d6fd65d612c792ff1ca7c070fb9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCPInfo
GetConsoleAliasExesLengthA
DeleteVolumeMountPointA
EndUpdateResourceW
MoveFileExW
GlobalSize
GetModuleHandleExW
InterlockedCompareExchange
WriteConsoleInputA
GetModuleHandleW
FindNextVolumeMountPointA
GetConsoleAliasesA
Sleep
GetConsoleAliasExesLengthW
GetVersionExW
CreateSemaphoreA
GetFileAttributesW
GetBinaryTypeA
GetThreadPriorityBoost
RaiseException
CreateJobObjectA
InterlockedExchange
GetLastError
GetProcAddress
VirtualAlloc
EnterCriticalSection
GetDiskFreeSpaceW
LoadLibraryA
WriteConsoleA
OpenWaitableTimerW
LocalAlloc
RemoveDirectoryW
QueryDosDeviceW
SetProcessWorkingSetSize
OpenJobObjectW
FindAtomA
Module32FirstW
GetModuleHandleA
GetStringTypeW
EnumDateFormatsW
SetFileShortNameA
GetVersionExA
GetWindowsDirectoryW
CreateFileA
CloseHandle
ExitProcess
GetStartupInfoW
HeapAlloc
HeapFree
LeaveCriticalSection
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
WriteFile
GetModuleFileNameA
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapReAlloc
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
RtlUnwind
GetACP
GetOEMCP
IsValidCodePage
HeapSize
GetLocaleInfoA
FlushFileBuffers
SetStdHandle
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
user32
LoadMenuA
CharLowerBuffW
CopyAcceleratorTableA
LoadIconW
GetSysColorBrush
GetMenuInfo
SetCaretPos
GetCaretBlinkTime
Sections
.text Size: 73KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xeda Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.nap Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.mayari Size: 1024B - Virtual size: 723B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bulipiz Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ