Static task
static1
Behavioral task
behavioral1
Sample
79f26c19a5c2ab7ed93f9efff59c1425e4df512570ff1d7e1ac16f3d61545cbf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
79f26c19a5c2ab7ed93f9efff59c1425e4df512570ff1d7e1ac16f3d61545cbf.exe
Resource
win10v2004-20220812-en
General
-
Target
79f26c19a5c2ab7ed93f9efff59c1425e4df512570ff1d7e1ac16f3d61545cbf
-
Size
206KB
-
MD5
33eb29009b93c3ec8941461a63123aef
-
SHA1
e2a8295488b6a831705b7255c1d49c07dc750407
-
SHA256
79f26c19a5c2ab7ed93f9efff59c1425e4df512570ff1d7e1ac16f3d61545cbf
-
SHA512
fc3786c6aa0884acbbfe06c5e10e99a23b9bf2c62fb523493c5ee8634618d429692aa4a3ccfbf079cbe509f786e08900becedb12798e813c117f8f4c1a31b53f
-
SSDEEP
3072:jPcQ+YumuLI9K3BEe0nZ1Z8Iwqia5kVTeKugmekKaOPWA2pa50dh4xhxpXY+z1qo:jEQpuLMjZ1LwqrqTe/gTk2aMz1
Malware Config
Signatures
Files
-
79f26c19a5c2ab7ed93f9efff59c1425e4df512570ff1d7e1ac16f3d61545cbf.exe windows x86
33c62c2f2dafd95e2e25a4aa91458e72
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
LoadLibraryA
RtlUnwind
InterlockedExchange
VirtualQuery
HeapReAlloc
HeapAlloc
HeapFree
VirtualAlloc
GetShortPathNameW
EnumSystemCodePagesW
CreateDirectoryExW
ExitThread
WaitNamedPipeA
WritePrivateProfileSectionA
CreateMutexW
DeleteCriticalSection
CreateNamedPipeA
WritePrivateProfileStructW
Sleep
SetEvent
WaitNamedPipeW
lstrcpynA
Toolhelp32ReadProcessMemory
GetWindowsDirectoryW
GetFullPathNameW
SetThreadPriorityBoost
CopyFileA
CreateDirectoryExA
OpenFileMappingA
GetThreadContext
FindNextFileW
FillConsoleOutputCharacterW
FindAtomA
UpdateResourceA
RtlFillMemory
GetPrivateProfileSectionA
SearchPathW
GetEnvironmentVariableW
DisconnectNamedPipe
GetCalendarInfoA
LocalLock
GetLogicalDrives
FreeConsole
TlsAlloc
GetLocaleInfoA
Process32Next
EnumDateFormatsExW
ReadConsoleA
RtlMoveMemory
GetDiskFreeSpaceExW
GetConsoleCursorInfo
WriteProfileStringW
RemoveDirectoryA
CompareStringA
DeleteFileW
UpdateResourceW
AllocConsole
ReleaseMutex
EscapeCommFunction
MoveFileA
EnumResourceLanguagesA
VirtualAllocEx
GetPriorityClass
lstrlenA
CreateConsoleScreenBuffer
ReleaseSemaphore
ExpandEnvironmentStringsA
GlobalUnWire
WriteProfileSectionA
CreateToolhelp32Snapshot
CreateWaitableTimerA
GetNamedPipeInfo
FindResourceExW
FlushInstructionCache
WriteConsoleInputA
Module32First
FreeLibrary
FindFirstFileExW
Heap32First
CreateSemaphoreW
WriteConsoleOutputA
FindFirstFileA
GetVersionExA
GetConsoleTitleA
GetCurrencyFormatA
GetPrivateProfileSectionW
LocalSize
WaitForDebugEvent
IsValidLocale
WriteFileGather
SetVolumeLabelA
OutputDebugStringW
GetConsoleMode
GetModuleHandleW
GetLogicalDriveStringsA
PeekNamedPipe
GetConsoleScreenBufferInfo
lstrcpyn
OpenWaitableTimerA
VirtualLock
GetFileAttributesW
WriteProcessMemory
GetPrivateProfileSectionNamesW
EnumTimeFormatsA
InitializeCriticalSection
WideCharToMultiByte
GetUserDefaultLangID
GetProfileStringA
GetSystemDefaultLCID
LoadLibraryExW
PulseEvent
GetStringTypeExA
UnmapViewOfFile
SetEnvironmentVariableW
EnumDateFormatsExA
SetComputerNameA
UnhandledExceptionFilter
LoadLibraryW
MapViewOfFile
GetDriveTypeW
GetLogicalDriveStringsW
FindFirstChangeNotificationA
OpenMutexA
GetProcessTimes
CreateDirectoryA
LoadModule
Thread32First
GetShortPathNameA
SetWaitableTimer
GetVersion
GetThreadSelectorEntry
GlobalUnlock
LocalFlags
ResetWriteWatch
GetEnvironmentStringsA
GetProfileSectionA
GetCurrentDirectoryW
GetFileAttributesA
SearchPathA
LocalShrink
TransmitCommChar
ReadFile
FindFirstFileW
GetNumberFormatA
FillConsoleOutputCharacterA
FreeEnvironmentStringsA
GetPrivateProfileSectionNamesA
WriteConsoleOutputCharacterA
HeapWalk
GetThreadTimes
GetLongPathNameA
GetNamedPipeHandleStateW
GetTempFileNameA
lstrcatA
FindResourceExA
SetConsoleTitleA
GlobalAlloc
WritePrivateProfileSectionW
GetLocalTime
GetStringTypeA
WriteProfileStringA
LocalFree
GetProfileIntW
GlobalFree
HeapLock
GetTimeZoneInformation
SetFilePointer
GetNamedPipeHandleStateA
CompareFileTime
GetThreadPriorityBoost
GetTimeFormatA
DebugBreak
GetFileType
SetCurrentDirectoryA
RemoveDirectoryW
VirtualFreeEx
gdi32
SetArcDirection
ExcludeClipRect
CopyMetaFileA
CreateColorSpaceW
GetColorAdjustment
GdiPlayDCScript
ScaleWindowExtEx
SetDeviceGammaRamp
EnumFontsA
EnumFontsW
GetClipBox
SetTextJustification
SetBoundsRect
ResizePalette
PolyPolygon
GetStretchBltMode
AbortDoc
CreateRectRgn
PlayEnhMetaFile
PtVisible
SetPaletteEntries
LineDDA
CreateEnhMetaFileA
OffsetWindowOrgEx
ChoosePixelFormat
CancelDC
GetCharWidthFloatW
ColorCorrectPalette
GetCharacterPlacementW
ResetDCA
PolyTextOutA
GetNearestPaletteIndex
GetMetaFileBitsEx
SetWinMetaFileBits
Pie
OffsetViewportOrgEx
FlattenPath
GetDeviceGammaRamp
CreateBrushIndirect
SetDIBits
CreatePenIndirect
SetGraphicsMode
AnimatePalette
GetClipRgn
GetWindowExtEx
PlgBlt
Ellipse
GetBitmapBits
GetEnhMetaFileW
GetCharWidthFloatA
GetTextFaceW
Polyline
SetSystemPaletteUse
CreateDIBPatternBrushPt
AddFontResourceA
GetLayout
GetTextExtentPoint32W
MaskBlt
EndPage
DescribePixelFormat
SetICMProfileW
StartDocA
SetWindowExtEx
GdiPlayJournal
CombineRgn
GetEnhMetaFileHeader
ArcTo
PtInRegion
GetMetaFileA
SetWindowOrgEx
GetStockObject
GetTextAlign
GetEnhMetaFileA
PolyPolyline
SetAbortProc
GetRegionData
EnumFontFamiliesW
GetMiterLimit
SwapBuffers
advapi32
RegSetKeySecurity
DuplicateTokenEx
CryptDeriveKey
comdlg32
GetSaveFileNameA
FindTextW
GetOpenFileNameW
GetOpenFileNameA
ReplaceTextA
Sections
.text Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 87KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ