Static task
static1
Behavioral task
behavioral1
Sample
4b19d0f281a33094245863b50141af01d6fd4f1222f06dd38b16b8de41968eaa.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4b19d0f281a33094245863b50141af01d6fd4f1222f06dd38b16b8de41968eaa.exe
Resource
win10v2004-20230220-en
General
-
Target
4b19d0f281a33094245863b50141af01d6fd4f1222f06dd38b16b8de41968eaa
-
Size
125KB
-
MD5
d2f5e572e693e6a8d5f03e874f34e017
-
SHA1
666a4974cc0f6fe7a34b06d4e4f585bb239ba62f
-
SHA256
5a1d3c322d4fbe5249732f93e4f6fc5ba8baf13d52e08e4d60de881d6f5e706f
-
SHA512
2887a5dafcb50a385b5870e30f69145f506449a372f3cc1d62f473a7f0e9598cbb8e675554a5c6b7d8197ffcf2f63d1cecefa523f504158ac2fa8bb2df2c51de
-
SSDEEP
3072:B1jgyUy+ODTsGiYMeBBXLzsd+yfOChX8yxpn3uwfYn8N2v3HFtQH+:BZUc/sEj++IOChv+X8wvT
Malware Config
Signatures
Files
-
4b19d0f281a33094245863b50141af01d6fd4f1222f06dd38b16b8de41968eaa.zip
-
4b19d0f281a33094245863b50141af01d6fd4f1222f06dd38b16b8de41968eaa.exe windows x86
763e9e576ac4f8f5d8c94582bd0a0f4a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFirmwareEnvironmentVariableW
GetCPInfoExW
CreateEventW
CopyFileExA
GetProcAddress
GlobalAlloc
SetDefaultCommConfigA
OpenWaitableTimerW
GetFileAttributesW
EnumResourceTypesW
WriteFileGather
GetModuleHandleW
InterlockedCompareExchange
UnhandledExceptionFilter
LocalFlags
GlobalLock
GetConsoleAliasW
WritePrivateProfileSectionA
GetCurrentThreadId
SetLastError
ReadConsoleInputW
lstrcmpA
SetCalendarInfoA
GetSystemWindowsDirectoryA
GetConsoleAliasExesW
EnumTimeFormatsW
GetSystemDirectoryW
AddAtomA
GetExitCodeThread
_llseek
FindNextFileW
CopyFileA
GetShortPathNameW
EnumCalendarInfoA
EnumCalendarInfoExA
CreateActCtxA
FindFirstVolumeMountPointA
PulseEvent
SleepEx
LoadLibraryA
GetLastError
HeapReAlloc
HeapAlloc
MoveFileA
DeleteFileA
GetCommandLineA
HeapSetInformation
GetStartupInfoW
IsProcessorFeaturePresent
EncodePointer
DecodePointer
HeapCreate
HeapFree
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LoadLibraryW
Sleep
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
MultiByteToWideChar
HeapSize
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LCMapStringW
GetStringTypeW
ReadFile
SetFilePointer
CloseHandle
WriteConsoleW
SetStdHandle
CreateFileW
user32
LoadMenuW
DefDlgProcA
GetListBoxInfo
gdi32
GetCharWidth32A
advapi32
LookupAccountSidW
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 77KB - Virtual size: 578KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ