Static task
static1
Behavioral task
behavioral1
Sample
064fb549d1d4a2b095cf0484234fe3391b46d60c8b7acc63931f749b14d75fc1.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
064fb549d1d4a2b095cf0484234fe3391b46d60c8b7acc63931f749b14d75fc1.exe
Resource
win10v2004-20230220-en
General
-
Target
064fb549d1d4a2b095cf0484234fe3391b46d60c8b7acc63931f749b14d75fc1
-
Size
2.4MB
-
MD5
5d346e578f46184d9cf3ad2d2d5fd5ed
-
SHA1
53b094046b36e32f0e6cc5fb94173d690260b79c
-
SHA256
064fb549d1d4a2b095cf0484234fe3391b46d60c8b7acc63931f749b14d75fc1
-
SHA512
fa8daf0081031c37bfb30c4cdb2245aa7be8df90f0b05b64ebea35197874e1471f5e9262e6de5235f82da951a7c03f470879faea6c1630bdbe8ce3bf67606755
-
SSDEEP
49152:sUrATp5oJPQJgMMwRfCSBXD7HvPOWewZZoDsf0gCus:sUrA15oJoJgyJjBzbOWeV4
Malware Config
Signatures
Files
-
064fb549d1d4a2b095cf0484234fe3391b46d60c8b7acc63931f749b14d75fc1.exe windows x86
85280fc715ab94de2bb4df5f1594edd2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFullPathNameW
GetCurrentDirectoryW
GetVersionExW
GetModuleHandleW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetLongPathNameW
GetExitCodeProcess
WriteFile
GetTempPathW
CreateFileW
GetFileAttributesW
DeleteFileW
CopyFileW
GetLastError
GetPrivateProfileIntW
OpenProcess
CreateProcessW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
DecodePointer
HeapReAlloc
HeapSize
RaiseException
InitializeCriticalSectionAndSpinCount
GetFileSize
ReadFile
MultiByteToWideChar
WideCharToMultiByte
LoadLibraryW
GetModuleFileNameW
ReleaseMutex
CreateMutexW
FindClose
lstrcpyW
FindFirstFileW
FindNextFileW
MoveFileExW
GetEnvironmentVariableW
CreateDirectoryW
FileTimeToSystemTime
LocalFree
GetSystemInfo
GetSystemDirectoryW
GetVolumeInformationW
GlobalAlloc
GlobalFree
LocalAlloc
DeleteCriticalSection
DeviceIoControl
OutputDebugStringA
SetPriorityClass
EncodePointer
RtlUnwind
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
ExitProcess
GetStdHandle
GetACP
GetFileType
GetStringTypeW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetConsoleMode
ReadConsoleW
SetFilePointerEx
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetConsoleCtrlHandler
OutputDebugStringW
SetStdHandle
GetConsoleCP
GetTimeZoneInformation
FlushFileBuffers
WriteConsoleW
SetEndOfFile
FreeLibraryAndExitThread
ExitThread
GetTickCount
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
SystemTimeToFileTime
GetSystemTime
ReadConsoleA
SetConsoleMode
ConvertThreadToFiber
ConvertFiberToThread
CreateFiber
DeleteFiber
SwitchToFiber
VerifyVersionInfoA
GetSystemDirectoryA
GetModuleHandleA
VerSetConditionMask
ExpandEnvironmentStringsA
PeekNamedPipe
CreateThread
Sleep
CreateEventW
WaitForSingleObject
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
MapViewOfFile
CloseHandle
FlushViewOfFile
UnmapViewOfFile
OpenFileMappingW
IsBadReadPtr
FreeLibrary
GetProcessHeap
GetProcAddress
HeapAlloc
GetNativeSystemInfo
LoadLibraryA
VirtualAlloc
WaitForMultipleObjects
SleepEx
FormatMessageA
VirtualFree
SetLastError
HeapFree
VirtualProtect
GetPrivateProfileStringW
GetModuleHandleExW
WritePrivateProfileStringW
user32
GetLastInputInfo
LoadStringW
GetProcessWindowStation
wsprintfW
GetUserObjectInformationW
MessageBoxW
ole32
CoInitialize
CoUninitialize
CoCreateInstance
shlwapi
PathFileExistsW
advapi32
ReportEventW
CryptGenRandom
DeregisterEventSource
RegisterEventSourceW
CryptAcquireContextW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
DuplicateTokenEx
LookupAccountSidW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetTokenInformation
OpenProcessToken
RegOpenKeyW
RegEnumKeyW
ImpersonateLoggedOnUser
RevertToSelf
RegSetValueExW
RegQueryValueExW
CryptReleaseContext
shell32
SHGetFolderPathW
SHGetSpecialFolderPathW
wininet
InternetCloseHandle
InternetQueryOptionW
HttpQueryInfoW
InternetOpenW
InternetSetOptionW
InternetOpenUrlW
InternetReadFile
wldap32
ord143
ord46
ord211
ord60
ord50
ord41
ord22
ord26
ord27
ord32
ord33
ord35
ord79
ord30
ord200
ord301
ws2_32
WSACleanup
WSAGetLastError
__WSAFDIsSet
select
gethostname
ioctlsocket
listen
accept
sendto
recvfrom
freeaddrinfo
getaddrinfo
WSAIoctl
socket
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
connect
WSAStartup
bind
send
recv
WSASetLastError
closesocket
Sections
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 523KB - Virtual size: 522KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 432B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 203KB - Virtual size: 202KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ