Static task
static1
Behavioral task
behavioral1
Sample
5f9f3bc8b062921e795a6420444e12d762a34574141147feb8ec14b93a78e0da.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5f9f3bc8b062921e795a6420444e12d762a34574141147feb8ec14b93a78e0da.exe
Resource
win10v2004-20220812-en
General
-
Target
5f9f3bc8b062921e795a6420444e12d762a34574141147feb8ec14b93a78e0da
-
Size
1.2MB
-
MD5
58e3ff39cebaac1cec682b40f8019f9f
-
SHA1
feda57bbf64b5bee2c0dbf3af3c292d0858d113d
-
SHA256
5f9f3bc8b062921e795a6420444e12d762a34574141147feb8ec14b93a78e0da
-
SHA512
18f0c9b4c603238c105255725a598526ddc62b1c3fce7984953e0778a0a4e996e6ab44629e576f3e7b7a11d9400471509edc0cab58028be4401a903d388c988a
-
SSDEEP
24576:KZDVXMrFCyKVEfmK+uG219havoiKsj7IUerM0bDS4F4YoEtl719:KZ5cwyKe3G2eoiVjMUOl/S4OYo8lp9
Malware Config
Signatures
Files
-
5f9f3bc8b062921e795a6420444e12d762a34574141147feb8ec14b93a78e0da.exe windows x86
b88678d9a1244225510b0412659ca020
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegOpenKeyExA
kernel32
CloseHandle
CreateDirectoryA
CreateEventA
CreateFileA
CreateMutexA
CreateThread
DeleteCriticalSection
DeleteFileA
EnterCriticalSection
EnumResourceLanguagesA
EnumResourceNamesA
EnumResourceTypesA
ExitProcess
ExitThread
FindResourceA
FindResourceExA
FreeLibrary
FreeResource
GetCommandLineA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentVariableA
GetFileAttributesA
GetFileType
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetThreadPriority
GetTickCount
GetVolumeInformationA
HeapAlloc
HeapFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
LoadResource
LocalAlloc
LocalFree
LockResource
MultiByteToWideChar
ReadFile
ReadProcessMemory
ResetEvent
ResumeThread
SetErrorMode
SetEvent
SetFilePointer
SetLastError
SetThreadPriority
SetUnhandledExceptionFilter
SizeofResource
Sleep
SuspendThread
TerminateThread
TlsAlloc
TlsGetValue
TlsSetValue
VirtualAlloc
VirtualProtect
WaitForSingleObject
WideCharToMultiByte
WriteFile
oleaut32
SysAllocStringLen
SysFreeString
SysReAllocStringLen
shell32
ShellExecuteA
user32
CharLowerBuffW
CharUpperBuffW
MessageBoxA
wsock32
WSACleanup
WSAStartup
closesocket
connect
gethostbyname
htons
recv
send
socket
Sections
.text Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 37KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 169KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ