Static task
static1
Behavioral task
behavioral1
Sample
994697f70163e3637f163ac29b4d26a1.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
994697f70163e3637f163ac29b4d26a1.exe
Resource
win10v2004-20230221-en
General
-
Target
994697f70163e3637f163ac29b4d26a1.exe
-
Size
470KB
-
MD5
994697f70163e3637f163ac29b4d26a1
-
SHA1
65e08b43c4a7ba6a2677e9b1e8a1aa10358f2498
-
SHA256
0c75beadd7a297e00839f017193eff97a70e22a2d5ccfb433f36868f603b1111
-
SHA512
531dd95e4889a13d6c1ec603d17eb237ed5f892a906f3fe642663dc62c5369df499a8a5edc4cd8f20ba536e6369a267aac733abcdccf85e1a3edd0195f132c4d
-
SSDEEP
12288:5H5XH8acQg/6UQIrEczM772kvSoSPIkeCYNCV:5ZXc5/4377fl6YNCV
Malware Config
Signatures
Files
-
994697f70163e3637f163ac29b4d26a1.exe.exe windows x86
24889b35e9499053a36c4c46ed7c8b9e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeW
GetConsoleAliasExesLengthA
SetUnhandledExceptionFilter
EnumCalendarInfoW
GetConsoleAliasA
GetCurrentProcess
GetUserDefaultLCID
InterlockedCompareExchange
WriteConsoleInputA
SetEvent
FreeEnvironmentStringsA
CreateRemoteThread
WaitNamedPipeW
FindActCtxSectionStringA
AllocateUserPhysicalPages
GetEnvironmentStrings
GlobalAlloc
WideCharToMultiByte
GlobalFindAtomA
LoadLibraryW
GetConsoleMode
GetVersionExW
GetFileAttributesA
DnsHostnameToComputerNameW
GetComputerNameExA
FindNextVolumeW
GetModuleFileNameW
lstrcmpW
GetVolumePathNameA
FindNextVolumeMountPointW
GetStringTypeA
GetConsoleOutputCP
OpenMutexW
GetLastError
BackupRead
GetProcAddress
GlobalGetAtomNameA
PrepareTape
LoadLibraryA
OpenMutexA
SetCalendarInfoW
BuildCommDCBAndTimeoutsW
RemoveDirectoryW
SetCommMask
RtlCaptureStackBackTrace
GetPrivateProfileStructA
GetTapeParameters
EnumResourceTypesW
FindNextFileA
SetConsoleCursorInfo
GetModuleHandleA
CreateMutexA
CreateMailslotA
RequestWakeupLatency
GetDiskFreeSpaceExW
DeleteFileW
GetFileInformationByHandle
EnumSystemLocalesW
CreateFileW
WriteConsoleW
GetNamedPipeHandleStateW
GetModuleHandleExA
FlushFileBuffers
SetStdHandle
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
Sleep
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapAlloc
DeleteFileA
HeapReAlloc
GetModuleHandleW
ExitProcess
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
LCMapStringW
MultiByteToWideChar
GetCPInfo
UnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
IsProcessorFeaturePresent
HeapCreate
HeapDestroy
WriteFile
GetStdHandle
SetFilePointer
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetCurrentThread
FatalAppExitA
SetConsoleCtrlHandler
FreeLibrary
GetLocaleInfoW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
GetConsoleCP
CloseHandle
user32
GetMenu
advapi32
ReportEventW
winhttp
WinHttpSetOption
Sections
.text Size: 147KB - Virtual size: 146KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 219KB - Virtual size: 3.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ