Static task
static1
Behavioral task
behavioral1
Sample
a42820e61e9a397bfa72220502020cb17b7403b887a915d4a7be53b71a4b4c10.exe
Resource
win10v2004-20230221-en
General
-
Target
a42820e61e9a397bfa72220502020cb17b7403b887a915d4a7be53b71a4b4c10
-
Size
701KB
-
MD5
acb8cb132854ba3073261dcde6c6a4b6
-
SHA1
a93692c65ba4a227cdd61d76859d00324634a6ff
-
SHA256
a42820e61e9a397bfa72220502020cb17b7403b887a915d4a7be53b71a4b4c10
-
SHA512
166bd69f1b8f214c5e18022a70f918cdbdbcc292becc6e45831f412301c02ff3f7f94ad312e1befd1a564e40db74bafbcacd435293b1a861d046b58598495024
-
SSDEEP
12288:0rdQQOASlGgBpTvntU+C1J+P+p5kB5KhjWaP4GPkRnTM5mKjj2u1+qhBkNgU0inp:udhV4ttUhLpyB5CKw4GNJuZqBprA
Malware Config
Signatures
Files
-
a42820e61e9a397bfa72220502020cb17b7403b887a915d4a7be53b71a4b4c10.exe windows x86
e3f9c15c4b3609736f33755744ec1f93
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstVolumeMountPointW
ReleaseMutex
ReadConsoleInputW
VerifyVersionInfoW
GetCPInfoExW
CreateEventW
SetLocaleInfoA
GetProcAddress
LocalAlloc
DeleteFileA
EnumResourceTypesW
GetBinaryTypeA
SetLastError
LocalFlags
WriteProfileStringW
GetComputerNameExA
GetConsoleAliasW
GetWindowsDirectoryA
SetSystemPowerState
SetVolumeMountPointA
GetModuleHandleW
EnumResourceLanguagesW
SetDefaultCommConfigW
EnumDateFormatsA
GetCurrentActCtx
DeleteVolumeMountPointW
GetStartupInfoW
CreateJobSet
WritePrivateProfileStringA
FoldStringA
GetShortPathNameA
EnumCalendarInfoA
EnumCalendarInfoW
FindNextFileA
GetLastError
GetStringTypeExA
WriteConsoleInputW
WriteProfileSectionW
LoadLibraryA
DecodePointer
EncodePointer
GetCommandLineW
HeapSetInformation
IsProcessorFeaturePresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RaiseException
HeapFree
Sleep
RtlUnwind
WideCharToMultiByte
LoadLibraryW
LCMapStringW
MultiByteToWideChar
GetStringTypeW
HeapAlloc
HeapReAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
HeapSize
CloseHandle
WriteConsoleW
SetStdHandle
CreateFileW
gdi32
GetBoundsRect
advapi32
GetKernelObjectSecurity
Sections
.text Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 585KB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ