Static task
static1
Behavioral task
behavioral1
Sample
603e0b4083560a933494a6a844ecac4c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
603e0b4083560a933494a6a844ecac4c.exe
Resource
win10v2004-20230220-en
General
-
Target
603e0b4083560a933494a6a844ecac4c.exe
-
Size
471KB
-
MD5
603e0b4083560a933494a6a844ecac4c
-
SHA1
604063cfe175b37c6e7b21b6c7173ecddd9227ba
-
SHA256
2b999d539dab833c70b1575a767273eafcc880cc95114707215a10b05d4c26d7
-
SHA512
9f8a45140c8343ff0772d76036aaf6ccc51e09dc22a37c6174422a06c37fe19a12e48b116be1654d22e7e21334e7cfa781953a4bed62dfe7b4c321bf5dbac9cd
-
SSDEEP
12288:CH7LpwSt56Yl2CaUir53311Zo+9qSh0UsUXS8CV:CbLD5wlXKC3tfXS8CV
Malware Config
Signatures
Files
-
603e0b4083560a933494a6a844ecac4c.exe.exe windows x86
24889b35e9499053a36c4c46ed7c8b9e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeW
GetConsoleAliasExesLengthA
SetUnhandledExceptionFilter
EnumCalendarInfoW
GetConsoleAliasA
GetCurrentProcess
GetUserDefaultLCID
InterlockedCompareExchange
WriteConsoleInputA
SetEvent
FreeEnvironmentStringsA
CreateRemoteThread
WaitNamedPipeW
FindActCtxSectionStringA
AllocateUserPhysicalPages
GetEnvironmentStrings
GlobalAlloc
WideCharToMultiByte
GlobalFindAtomA
LoadLibraryW
GetConsoleMode
GetVersionExW
GetFileAttributesA
DnsHostnameToComputerNameW
GetComputerNameExA
FindNextVolumeW
GetModuleFileNameW
lstrcmpW
GetVolumePathNameA
FindNextVolumeMountPointW
GetStringTypeA
GetConsoleOutputCP
OpenMutexW
GetLastError
BackupRead
GetProcAddress
GlobalGetAtomNameA
PrepareTape
LoadLibraryA
OpenMutexA
SetCalendarInfoW
BuildCommDCBAndTimeoutsW
RemoveDirectoryW
SetCommMask
RtlCaptureStackBackTrace
GetPrivateProfileStructA
GetTapeParameters
EnumResourceTypesW
FindNextFileA
SetConsoleCursorInfo
GetModuleHandleA
CreateMutexA
CreateMailslotA
RequestWakeupLatency
GetDiskFreeSpaceExW
DeleteFileW
GetFileInformationByHandle
EnumSystemLocalesW
CreateFileW
WriteConsoleW
GetNamedPipeHandleStateW
GetModuleHandleExA
FlushFileBuffers
SetStdHandle
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
Sleep
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapAlloc
DeleteFileA
HeapReAlloc
GetModuleHandleW
ExitProcess
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
LCMapStringW
MultiByteToWideChar
GetCPInfo
UnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
IsProcessorFeaturePresent
HeapCreate
HeapDestroy
WriteFile
GetStdHandle
SetFilePointer
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetCurrentThread
FatalAppExitA
SetConsoleCtrlHandler
FreeLibrary
GetLocaleInfoW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
GetConsoleCP
CloseHandle
user32
GetMenu
advapi32
ReportEventW
winhttp
WinHttpSetOption
Sections
.text Size: 147KB - Virtual size: 146KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 219KB - Virtual size: 3.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ