Static task
static1
Behavioral task
behavioral1
Sample
7bbbf36aa005e97be82bd68518e13047fb9751195d982e2abbf5f2db8117b112.exe
Resource
win10-20230220-en
General
-
Target
7bbbf36aa005e97be82bd68518e13047fb9751195d982e2abbf5f2db8117b112
-
Size
244KB
-
MD5
53889bf96735dfe86b552c2ccd988347
-
SHA1
a3cb78cee63453089f0f2341d4bf6434763908e6
-
SHA256
7bbbf36aa005e97be82bd68518e13047fb9751195d982e2abbf5f2db8117b112
-
SHA512
373c79aa638f38230be7380d2c0e2b6aed9973468c59dc6290d6173da13ff098288b43d75705dedc7b71483020270b094f0e2ac1dda1db564884ae28a66ada19
-
SSDEEP
3072:jPjICP9pYLVcMMl31LLFxvm33Q4WXIjpN2wqy18qCbj1a0:jU20LI3RLFg3OIFf1ubpa
Malware Config
Signatures
Files
-
7bbbf36aa005e97be82bd68518e13047fb9751195d982e2abbf5f2db8117b112.exe windows x86
8c965d062b338134cc0af1a9d38bf4da
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenJobObjectA
CreateJobObjectW
GetProcessPriorityBoost
GetModuleHandleW
FindNextVolumeMountPointA
EscapeCommFunction
GetWindowsDirectoryA
Sleep
GetConsoleAliasExesLengthW
DeleteVolumeMountPointW
GetStringTypeExW
GetFileAttributesA
GlobalFlags
GetBinaryTypeA
GetThreadPriorityBoost
GetConsoleAliasesW
GetLastError
GetProcAddress
VirtualAlloc
WriteProfileSectionA
EnterCriticalSection
LoadLibraryA
MoveFileExW
WriteConsoleA
InterlockedExchangeAdd
LocalAlloc
GetProfileStringA
QueryDosDeviceW
GetOEMCP
EnumDateFormatsA
GetModuleHandleA
FreeEnvironmentStringsW
GetStringTypeW
SetFileShortNameA
EndUpdateResourceA
GetVersionExA
FindAtomW
GetWindowsDirectoryW
CreateFileA
CloseHandle
CreateSemaphoreW
GetModuleHandleExA
GetStringTypeA
HeapFree
ExitProcess
GetStartupInfoW
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
HeapAlloc
HeapReAlloc
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetFilePointer
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
WriteFile
GetModuleFileNameA
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RaiseException
RtlUnwind
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
IsValidCodePage
SetStdHandle
FlushFileBuffers
HeapSize
GetLocaleInfoA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
user32
GetCaretBlinkTime
LoadIconA
CharLowerBuffW
CopyAcceleratorTableA
LoadMenuW
GetSysColorBrush
GetMenuInfo
SetCaretPos
advapi32
ReportEventW
winhttp
WinHttpSetOption
Sections
.text Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 93KB - Virtual size: 39.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.mamoyes Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rire Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fecukil Size: 1024B - Virtual size: 723B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.katu Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ