Static task
static1
Behavioral task
behavioral1
Sample
17ace7f3972eb64cdd115be5b8fa1ffc6c13cd2f45b87ac165ae0c6cbf31a199.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
17ace7f3972eb64cdd115be5b8fa1ffc6c13cd2f45b87ac165ae0c6cbf31a199.exe
Resource
win10v2004-20220812-en
General
-
Target
17ace7f3972eb64cdd115be5b8fa1ffc6c13cd2f45b87ac165ae0c6cbf31a199
-
Size
364KB
-
MD5
8866fc0b6c6c51e6556a3a672b73ab97
-
SHA1
721e59cde563db6feb1b93f56a4d7e852c8dc6fb
-
SHA256
17ace7f3972eb64cdd115be5b8fa1ffc6c13cd2f45b87ac165ae0c6cbf31a199
-
SHA512
64587a7d8ed7bd38a7dd1bdcfea9bfb477b4f56ab7c9f1f6034656e5e3dc4c9eab98f95dec54b0e44da830c8fb9db91d2936c17869e21c7390c13a70a9c333cf
-
SSDEEP
6144:aOYNAZKUCFznh0itWNv9iX++bOEWUZ0HRLYuFGHe3qe9Xdm:aO+e8zSi2iX++bOE3cFRdtE
Malware Config
Signatures
Files
-
17ace7f3972eb64cdd115be5b8fa1ffc6c13cd2f45b87ac165ae0c6cbf31a199.exe windows x86
f083b34ba7d0c3fb7ac9f4fd404c9c39
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedExchange
GetSystemDirectoryA
GetSystemTime
GetCurrentThreadId
SetEvent
ExitProcess
VirtualFreeEx
Sleep
GetProcessHeap
GetLastError
WaitForSingleObject
GetModuleHandleA
GetProcAddress
FindNextFileA
user32
DestroyWindow
IsIconic
IsWindowVisible
LoadIconA
LoadStringA
ShowWindow
EnumThreadWindows
CreateWindowExA
LoadBitmapA
advapi32
CopySid
AddAce
shell32
DuplicateIcon
ole32
CoUninitialize
msvfw32
DrawDibSetPalette
avifil32
AVIStreamCreate
Sections
.text Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 300KB - Virtual size: 297KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 12KB - Virtual size: 353KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ