Static task
static1
Behavioral task
behavioral1
Sample
output.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
output.exe
Resource
win10v2004-20230220-en
General
-
Target
output.bin
-
Size
4.0MB
-
MD5
94226745b23f0c66f0b39a33223b94d8
-
SHA1
9948f0ff52d9dc8c97b169ee05d96122cd046205
-
SHA256
f725e30e11ff8d1171e5920921ae1c989758626980946d3ebd627970331e0d83
-
SHA512
783a8b4b50f386f263df7c882266382cc3c8ba8f3db6a8042a1d1485d3d7e4b78e2e612f094062663b6fc4c1e52e06f3d3a6b1e9dfb0e28bba5967cc6d0e99c4
-
SSDEEP
12288:8m44wzstp5IWXcEVCcs8c9kVQ4fL929kjVXLWSCMt/xS5AItfDMKx8/J:8md5p5IWXcYMqVhLc9kj5Hf3uZIB
Malware Config
Signatures
Files
-
output.bin.exe windows x86
b7b35df9422fa34b618b9a47085da8a0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitThread
OutputDebugStringW
WaitForSingleObjectEx
GetSystemInfo
LocalFree
GetComputerNameW
GlobalMemoryStatusEx
LCMapStringEx
CreateWaitableTimerW
CreateDirectoryW
SetWaitableTimer
AllocConsole
ExitProcess
GetProcAddress
Process32FirstW
LoadLibraryA
Process32NextW
CreateToolhelp32Snapshot
GetModuleHandleA
VirtualAlloc
GetCommandLineW
CreateEventA
SetEvent
LeaveCriticalSection
EnterCriticalSection
GetCurrentProcessId
GetCurrentThreadId
GetFileAttributesW
GetEnvironmentVariableW
GetProcessHeap
DeleteCriticalSection
K32EnumProcesses
CloseHandle
CreateEventW
WaitForSingleObject
InitializeCriticalSection
HeapFree
DecodePointer
WriteConsoleW
HeapSize
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
Sleep
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableSRW
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryAcquireSRWLockExclusive
FormatMessageA
QueryPerformanceCounter
GetLocaleInfoEx
InitializeCriticalSectionEx
GetSystemTimeAsFileTime
GetModuleHandleW
GetFileInformationByHandleEx
GetLastError
HeapReAlloc
HeapAlloc
GlobalAlloc
GlobalLock
GlobalUnlock
ReadFile
GetCurrentProcess
TerminateProcess
K32GetModuleFileNameExW
LocalAlloc
OpenProcess
ProcessIdToSessionId
FindFirstFileW
GetFileSizeEx
FindNextFileW
WriteFile
GetModuleFileNameW
SetFilePointer
FindClose
CreateFileW
GetFileAttributesExW
CopyFileW
FreeLibrary
LoadLibraryExW
IsWow64Process
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
RtlUnwind
RaiseException
SetLastError
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetStdHandle
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
GetFileType
SetFilePointerEx
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
ReadConsoleW
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
SetEndOfFile
user32
DestroyWindow
GetWindow
DefWindowProcW
GetWindowTextLengthW
GetWindowLongW
IsClipboardFormatAvailable
SetClipboardData
GetClipboardData
EmptyClipboard
CloseClipboard
OpenClipboard
GetClipboardOwner
DispatchMessageW
CallNextHookEx
GetCursorPos
AddClipboardFormatListener
RemoveClipboardFormatListener
CreateWindowExW
IsGUIThread
SetWindowLongW
GetDesktopWindow
SetWindowsHookExW
TranslateMessage
GetKeyState
UnhookWindowsHookEx
AttachThreadInput
GetWindowThreadProcessId
GetMessageW
UnregisterClassW
RegisterClassW
GetKeyboardState
GetTopWindow
GetForegroundWindow
GetWindowTextW
ToUnicodeEx
GetKeyboardLayout
advapi32
GetSidSubAuthorityCount
RegGetValueW
RegOpenKeyExW
RegSetValueExW
RegCloseKey
GetUserNameW
GetSidSubAuthority
GetTokenInformation
SystemFunction036
OpenProcessToken
shell32
SHGetFolderPathW
ole32
CoInitialize
CoTaskMemFree
CoCreateInstance
CoInitializeEx
oleaut32
VariantClear
SysAllocString
SysFreeString
VariantInit
crypt32
CryptUnprotectData
bcrypt
BCryptGenRandom
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationW
WTSEnumerateSessionsW
Sections
.text Size: 574KB - Virtual size: 573KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 133KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ