Static task
static1
Behavioral task
behavioral1
Sample
4520xjUleEHIWmEDRjVWARybIWaF.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4520xjUleEHIWmEDRjVWARybIWaF.exe
Resource
win10v2004-20230221-en
General
-
Target
4520xjUleEHIWmEDRjVWARybIWaF.exe
-
Size
660KB
-
MD5
348237541d9eb9da08e5dcbe86a01926
-
SHA1
a9d301c2a7a1e46ca7693a0f45749cc66d17bcf8
-
SHA256
4d8a9f06732f2e5d2247ac16b63e9f338df7e44318f12fadffffd0d91669c557
-
SHA512
4a61db2d61853099535d5942ffad3a813b6fe8d8bdb9c571398e0949c9050e024aadcf49945931e5f71f0ff7a3a7c9dd9f4ff7fdaaaeb85d12436bf6027947bf
-
SSDEEP
12288:i4BZOw0QhiYX6YklLugP39V+x0r15jNypba+nkyTHE:7ZF0ci1JuQV+OrHjYpmDyw
Malware Config
Signatures
Files
-
4520xjUleEHIWmEDRjVWARybIWaF.exe.exe windows x86
e7c477d0b0cb5ed685b6b07eef0bd4e9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCPInfo
GetConsoleAliasExesLengthA
DeleteVolumeMountPointA
EndUpdateResourceW
MoveFileExW
GlobalSize
GetModuleHandleExW
InterlockedCompareExchange
WriteConsoleInputA
GetModuleHandleW
FindNextVolumeMountPointA
GetConsoleAliasesA
CreateActCtxW
Sleep
GetConsoleAliasExesLengthW
GetVersionExW
CreateSemaphoreA
GetFileAttributesW
GetBinaryTypeA
GetThreadPriorityBoost
RaiseException
CreateJobObjectA
InterlockedExchange
GetLastError
GetProcAddress
VirtualAlloc
EnterCriticalSection
GetDiskFreeSpaceW
LoadLibraryA
WriteConsoleA
OpenWaitableTimerW
LocalAlloc
RemoveDirectoryW
QueryDosDeviceW
SetProcessWorkingSetSize
OpenJobObjectW
FindAtomA
Module32FirstW
GetModuleHandleA
GetStringTypeW
EnumDateFormatsW
SetFileShortNameA
GetVersionExA
GetWindowsDirectoryW
CreateFileA
CloseHandle
ExitProcess
GetStartupInfoW
HeapAlloc
HeapFree
LeaveCriticalSection
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
WriteFile
GetModuleFileNameA
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapReAlloc
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
RtlUnwind
GetACP
GetOEMCP
IsValidCodePage
HeapSize
GetLocaleInfoA
FlushFileBuffers
SetStdHandle
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
user32
LoadMenuA
CharLowerBuffW
CopyAcceleratorTableA
LoadIconW
GetSysColorBrush
GetMenuInfo
SetCaretPos
GetCaretBlinkTime
Sections
.text Size: 73KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 522KB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zipid Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ceba Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.javiga Size: 1024B - Virtual size: 723B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.jigam Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ