Static task
static1
Behavioral task
behavioral1
Sample
57b84668df9c187d0a5c741e5b1fd6a07a730c6ab6a0235676d891107c0670b5.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
57b84668df9c187d0a5c741e5b1fd6a07a730c6ab6a0235676d891107c0670b5.exe
Resource
win10v2004-20230221-en
General
-
Target
57b84668df9c187d0a5c741e5b1fd6a07a730c6ab6a0235676d891107c0670b5
-
Size
2.1MB
-
MD5
7ec3367eca7ba42b51b61b4e44c80cf3
-
SHA1
9d47d982936938b0d2dbf055ff7daa9af05794af
-
SHA256
57b84668df9c187d0a5c741e5b1fd6a07a730c6ab6a0235676d891107c0670b5
-
SHA512
a7759598543247442c9aa04db6067b9b06f99cd4aa45ea25e74a361612c2c2cf011dd6e2978fa8be6a551dd3aa2e7d89b9a81fe825fc440e994cfb68809be039
-
SSDEEP
24576:wMIIn+DYZN3ybl9a6+AKUbBXZtg6Kten:wc+9XQ
Malware Config
Signatures
Files
-
57b84668df9c187d0a5c741e5b1fd6a07a730c6ab6a0235676d891107c0670b5.exe windows x64
e1cecda6835b5d410fcedf20d705a17a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
HeapCreate
HeapFree
InitializeCriticalSectionEx
HeapSize
EnumSystemLocalesA
GetLastError
HeapReAlloc
CloseHandle
RaiseException
HeapAlloc
DecodePointer
DeleteCriticalSection
GetProcessHeap
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
EncodePointer
MultiByteToWideChar
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
IsDebuggerPresent
OutputDebugStringW
SetEndOfFile
CreateFileW
WriteConsoleW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
WriteFile
GetACP
GetFileType
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadFile
ReadConsoleW
SetFilePointerEx
RtlUnwind
user32
MessageBoxA
ntdll
RtlEthernetStringToAddressA
Sections
.text Size: 134KB - Virtual size: 133KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ