Behavioral task
behavioral1
Sample
23e7084fb65827f7e09056a53c339340.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
23e7084fb65827f7e09056a53c339340.exe
Resource
win10v2004-20231215-en
General
-
Target
23e7084fb65827f7e09056a53c339340
-
Size
838KB
-
MD5
23e7084fb65827f7e09056a53c339340
-
SHA1
924ec18268112218ea9accfb4d7a8f3a97bd9117
-
SHA256
555ac4fe7c28417daa7f9c3ebcd96b4511719a8f74a67942d76371b9a8b03a0e
-
SHA512
558d92a3ea4024b2be724abc927a93a50fa4c066406947249b9ddfaa5fc83184a7f7ad0b04d47d08ea7a201efcf060d82f482ba93c2b6387dfccb7687ecc0fa8
-
SSDEEP
12288:v4TrXRxiYxcVjVgJlGDEMnqqK9M0gG/Z1Qi9wXKuQbN56q6LWgFthMKrHIxTmHwl:v4RxD8pgJlOZdK9M0x/fJKXJeR6yJT
Malware Config
Extracted
vidar
40.4
973
https://romkaxarit.tumblr.com/
-
profile_id
973
Signatures
Files
-
23e7084fb65827f7e09056a53c339340.exe windows:5 windows x86 arch:x86
422c1a894fb7ba8c5b29fe9ee067d2cb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalFree
HeapAlloc
GetProcessHeap
HeapFree
lstrcatA
CreateDirectoryA
FindClose
FindNextFileW
DeleteFileW
lstrcmpW
FindFirstFileW
lstrcatW
lstrcpyW
FindNextFileA
CopyFileA
FindFirstFileA
GetDriveTypeA
GetLogicalDriveStringsA
DeleteFileA
GetCurrentProcessId
SetCurrentDirectoryA
CopyFileW
CloseHandle
WriteFile
CreateFileA
MultiByteToWideChar
ReadFile
GetFileSize
GetVersionExA
GetFileSizeEx
GetCurrentDirectoryA
GetPrivateProfileSectionNamesA
Process32Next
Process32First
CreateToolhelp32Snapshot
TerminateProcess
OpenProcess
GetProcAddress
LoadLibraryA
FreeLibrary
GetFileAttributesA
FileTimeToSystemTime
InterlockedCompareExchange
OutputDebugStringW
OutputDebugStringA
WaitForSingleObjectEx
WaitForSingleObject
UnmapViewOfFile
UnlockFileEx
UnlockFile
SystemTimeToFileTime
SetFilePointer
SetEndOfFile
QueryPerformanceCounter
MapViewOfFile
LockFileEx
LockFile
LoadLibraryW
HeapCompact
HeapValidate
HeapSize
HeapReAlloc
HeapDestroy
HeapCreate
GetVersionExW
LocalAlloc
GetTempPathW
GetTempPathA
GetSystemTimeAsFileTime
GetSystemTime
GetSystemInfo
GetLastError
GetFullPathNameW
GetFullPathNameA
GetFileAttributesExW
GetFileAttributesW
GetDiskFreeSpaceW
GetDiskFreeSpaceA
FormatMessageW
FormatMessageA
FlushFileBuffers
CreateMutexW
CreateFileMappingW
CreateFileMappingA
CreateFileW
AreFileApisANSI
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
TryEnterCriticalSection
GetCurrentThreadId
GetComputerNameA
IsWow64Process
GetCurrentProcess
GlobalMemoryStatus
GetModuleHandleA
GetUserDefaultLocaleName
TzSpecificLocalTimeToSystemTime
GetTimeZoneInformation
GetLocaleInfoA
GetFileInformationByHandle
GetLocalTime
CompareStringW
SetStdHandle
WideCharToMultiByte
Sleep
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetLocaleInfoW
GetStringTypeW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetConsoleMode
GetConsoleCP
SetEnvironmentVariableA
SetEnvironmentVariableW
GetModuleFileNameW
IsValidCodePage
GetOEMCP
GetACP
GetFileType
InitializeCriticalSectionAndSpinCount
GetStdHandle
SetHandleCount
SetLastError
TlsFree
TlsSetValue
TlsGetValue
GetTickCount
ExitProcess
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
EncodePointer
DecodePointer
RaiseException
RtlUnwind
ExitThread
CreateThread
GetCommandLineA
HeapSetInformation
GetStartupInfoW
LCMapStringW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetModuleHandleW
TlsAlloc
WriteConsoleW
user32
GetDesktopWindow
advapi32
GetUserNameA
shell32
SHFileOperationA
ShellExecuteA
SHGetFolderPathA
shlwapi
PathMatchSpecW
PathMatchSpecA
psapi
GetModuleFileNameExA
GetModuleBaseNameA
EnumProcessModules
wininet
DeleteUrlCacheEntry
gdiplus
GdipGetImageEncodersSize
GdipCreateBitmapFromHBITMAP
GdipSaveImageToFile
GdipCloneImage
GdipGetImageEncoders
GdiplusShutdown
GdipFree
GdipAlloc
GdiplusStartup
GdipDisposeImage
Sections
.text Size: 725KB - Virtual size: 724KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 34KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE