Static task
static1
Behavioral task
behavioral1
Sample
49afa6cbdd09db5543797cdeace144817b4adbe2fdc3b826e85e2cfe1bd6a1a9.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
49afa6cbdd09db5543797cdeace144817b4adbe2fdc3b826e85e2cfe1bd6a1a9.exe
Resource
win10v2004-20230220-en
General
-
Target
49afa6cbdd09db5543797cdeace144817b4adbe2fdc3b826e85e2cfe1bd6a1a9
-
Size
2.0MB
-
MD5
0ba353ecac5da1b1a7edd174e0ccacc7
-
SHA1
4d8f2a4ba3d16412a88d6f300728e190a0ad4cd8
-
SHA256
49afa6cbdd09db5543797cdeace144817b4adbe2fdc3b826e85e2cfe1bd6a1a9
-
SHA512
216cc1e8635e410dd95a45ff510fdac5fd1219604566ae0e59a30ab47c716e5aa13514f7047801673d3600907cf82805b05538e3cab61f46dada3a3ae569a64d
-
SSDEEP
49152:fplKzaTbM57hfU1DZ4TPNokkkkkkkkyRnz6zwO69L+5b:+v57hUkokkkkkkkkyRnz6zw
Malware Config
Signatures
Files
-
49afa6cbdd09db5543797cdeace144817b4adbe2fdc3b826e85e2cfe1bd6a1a9.exe windows x86
a78cad86ae4233abb53e5496841b0d99
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileW
LoadResource
FindResourceW
CopyFileW
CreateDirectoryW
GetCurrentProcessId
ReadFile
WriteFile
SetFileTime
SetFilePointer
SetEndOfFile
CreateFileW
CloseHandle
GetFileSize
GetFileTime
FindFirstFileW
GetLongPathNameW
GetFileAttributesExW
QueryDosDeviceW
GetCurrentProcess
OpenProcess
GetProcAddress
GetModuleHandleW
GetACP
MultiByteToWideChar
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
HeapFree
GetCurrentThreadId
GetVersionExW
HeapAlloc
LocalFree
GetProcessHeap
FreeResource
FindClose
GetFullPathNameW
lstrlenW
RemoveDirectoryW
GetTempPathW
GetFileAttributesW
SetFileAttributesW
GetCurrentDirectoryW
LockResource
GetSystemInfo
lstrcmpiW
GetLogicalDriveStringsW
LoadLibraryW
FreeLibrary
GetModuleFileNameW
GetCommandLineW
FreeLibraryAndExitThread
ExitThread
GetFileSizeEx
DeviceIoControl
ResetEvent
ResumeThread
FileTimeToSystemTime
SwitchToThread
CreateEventW
FormatMessageW
GetLastError
FindNextFileW
InitializeCriticalSectionAndSpinCount
GetLocalTime
GetModuleHandleExW
CreateMutexW
WaitForSingleObject
ReleaseMutex
GetEnvironmentVariableW
VirtualQuery
GetUserDefaultLangID
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
RaiseException
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
ExitProcess
GetStdHandle
GetFileType
GetStringTypeW
GetTimeZoneInformation
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
SetFilePointerEx
GetConsoleMode
ReadConsoleW
HeapReAlloc
GetConsoleCP
DecodePointer
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
OutputDebugStringW
CreateThread
SetStdHandle
FlushFileBuffers
WriteConsoleW
HeapSize
ExpandEnvironmentStringsW
Sleep
InterlockedExchangeAdd
WaitForMultipleObjects
SetEvent
GetTickCount
InterlockedExchange
GlobalMemoryStatusEx
SizeofResource
user32
GetSystemMetrics
WindowFromPoint
IsZoomed
GetForegroundWindow
GetWindowThreadProcessId
shell32
SHGetPathFromIDListW
ShellExecuteW
CommandLineToArgvW
SHGetFolderPathW
SHGetSpecialFolderPathW
ole32
CoInitializeEx
CoCreateInstance
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
shlwapi
PathFileExistsW
StrStrIW
PathAppendW
advapi32
RegCreateKeyExW
Sections
.text Size: 878KB - Virtual size: 878KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 176KB - Virtual size: 175KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 977KB - Virtual size: 977KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ