Static task
static1
Behavioral task
behavioral1
Sample
655e8f5805bd7b17e697247d215bb0fa7f493c0ad6748ed8a1145bdb226d1c73.exe
Resource
win10v2004-20230220-en
General
-
Target
655e8f5805bd7b17e697247d215bb0fa7f493c0ad6748ed8a1145bdb226d1c73
-
Size
859KB
-
MD5
e35e75645e3c545ad4591f272acb22f2
-
SHA1
af228bf06452a856f263cd56ee53633d58485aaf
-
SHA256
655e8f5805bd7b17e697247d215bb0fa7f493c0ad6748ed8a1145bdb226d1c73
-
SHA512
d5fc5de850055cb3b109e2ac5f0db7a76d6efec8185816ac47b522dbb463c684c701be3b2f0425686c930fa38e33c9326e1c688d034a994ce469738ad0cf0cba
-
SSDEEP
12288:QTOxz02qs2rYKST3QSONztyzVd8HVjoREW44XZq9eAHYI4WcqEx3kr:QKxyUgSStYVdmWEW44XZSekYIXUd
Malware Config
Signatures
Files
-
655e8f5805bd7b17e697247d215bb0fa7f493c0ad6748ed8a1145bdb226d1c73.exe windows x86
180182f511c2c9a851c98bfb224641e6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeW
GetConsoleAliasExesLengthA
BuildCommDCBAndTimeoutsA
SetUnhandledExceptionFilter
GetConsoleAliasA
GetCurrentProcess
GetNamedPipeHandleStateA
GetModuleHandleExW
GetUserDefaultLCID
InterlockedCompareExchange
WriteConsoleInputA
SetEvent
FreeEnvironmentStringsA
SetTapeParameters
GetModuleHandleW
CreateRemoteThread
WaitNamedPipeW
AllocateUserPhysicalPages
GetEnvironmentStrings
GlobalAlloc
GlobalFindAtomA
GetConsoleMode
GetVersionExW
GetFileAttributesA
GetComputerNameExA
FindNextVolumeW
GetModuleFileNameW
lstrcmpW
MultiByteToWideChar
GetStringTypeA
FindNextVolumeMountPointW
GetConsoleOutputCP
GetLastError
BackupRead
GetProcAddress
RemoveDirectoryA
GlobalGetAtomNameA
LoadLibraryA
OpenMutexA
SetCalendarInfoW
DnsHostnameToComputerNameA
SetCommMask
RtlCaptureStackBackTrace
GetPrivateProfileStructA
EnumResourceTypesW
FindNextFileA
GetModuleHandleA
EraseTape
CreateMutexA
CreateMailslotA
RequestWakeupLatency
ScrollConsoleScreenBufferA
GetDiskFreeSpaceExA
DeleteFileW
GetFileInformationByHandle
FindActCtxSectionStringW
EnumSystemLocalesW
CreateFileW
WriteConsoleW
GetVolumePathNameA
EnumCalendarInfoA
FlushFileBuffers
SetStdHandle
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
Sleep
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
DeleteFileA
HeapReAlloc
ExitProcess
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
HeapAlloc
WideCharToMultiByte
LCMapStringW
GetCPInfo
UnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
IsProcessorFeaturePresent
HeapCreate
HeapDestroy
SetFilePointer
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetCurrentThread
FatalAppExitA
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryW
GetLocaleInfoW
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
GetConsoleCP
CloseHandle
user32
GetMenu
advapi32
ReportEventA
winhttp
WinHttpSetOption
Sections
.text Size: 147KB - Virtual size: 146KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 607KB - Virtual size: 4.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ