Static task
static1
Behavioral task
behavioral1
Sample
new.exe
Resource
win10v2004-20230220-en
General
-
Target
new.exe
-
Size
993KB
-
MD5
5690bccf30da8d1b1c32613fecbdf7df
-
SHA1
d3c2d93402bb9b54557fc3180516b9762e076509
-
SHA256
e23158163a037638e2a30e68a4ff51396dabcdb5c3e5a2410865cbb36d13d767
-
SHA512
2b519bfca2b755bf142332111b1934cedc52f6c465768127125c8a7ba3f5b4afd0c53d961f43a623876649c688c430f5f8c277875fb3919567cbb8e6ae61fa01
-
SSDEEP
24576:x8YjET/6WQOdzExmkzeeIq0Swqxs6YmN:x2JQOdzE4TeIq0SwqShe
Malware Config
Signatures
Files
-
new.exe.exe windows x86
08b2b759e2fdb8f29e60c592875ae04b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_NET_RUN_FROM_SWAP
Imports
kernel32
WriteConsoleW
GetSystemPowerStatus
DeleteVolumeMountPointW
GetDefaultCommConfigW
CreateMutexW
GetStdHandle
InterlockedDecrement
SetSystemTimeAdjustment
FileTimeToSystemTime
GetNamedPipeHandleStateW
CallNamedPipeW
EnumResourceNamesW
BuildCommDCBAndTimeoutsA
EnterCriticalSection
DebugSetProcessKillOnExit
EnumTimeFormatsW
TlsSetValue
GetACP
WriteFile
GetCurrentActCtx
ReleaseActCtx
AddRefActCtx
GetHandleInformation
OpenFile
VerifyVersionInfoA
GetVersionExA
FreeLibrary
LoadLibraryExW
GetComputerNameA
CommConfigDialogA
VirtualProtect
GetProcessPriorityBoost
LoadLibraryW
GlobalAlloc
SetEndOfFile
CancelWaitableTimer
GetCurrentDirectoryW
VirtualFree
GetCommMask
HeapFree
RaiseException
GetBinaryTypeA
GlobalSize
SetConsoleMode
GetLargestConsoleWindowSize
WriteConsoleInputW
OpenMutexW
SetThreadContext
AddAtomW
FindVolumeMountPointClose
GetSystemTime
GetCommandLineA
SetLocalTime
GetSystemTimeAsFileTime
DisconnectNamedPipe
SetConsoleCursorInfo
TerminateProcess
GetFileAttributesW
GetLastError
lstrlenA
CompareStringW
CompareStringA
lstrcpyA
CreateJobObjectW
RtlUnwind
GetStartupInfoA
HeapAlloc
LeaveCriticalSection
SetHandleCount
GetFileType
DeleteCriticalSection
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetProcAddress
GetModuleHandleA
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetCurrentThread
Sleep
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
FatalAppExitA
VirtualAlloc
HeapReAlloc
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetOEMCP
IsValidCodePage
MultiByteToWideChar
HeapSize
SetConsoleCtrlHandler
InterlockedExchange
LoadLibraryA
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
ReadFile
SetFilePointer
GetLocaleInfoW
CloseHandle
WriteConsoleA
GetConsoleOutputCP
SetStdHandle
GetTimeZoneInformation
CreateFileA
SetEnvironmentVariableA
user32
GetComboBoxInfo
advapi32
ClearEventLogW
Sections
.text Size: 160KB - Virtual size: 160KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 325KB - Virtual size: 4.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sdata Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ndata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.Shared Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bindat Size: 164KB - Virtual size: 164KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ