Static task
static1
Behavioral task
behavioral1
Sample
4f866bf804ee8b04ce6fc9eadcf9f74e64a305c4bdab66eb24c78e46261119ff.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4f866bf804ee8b04ce6fc9eadcf9f74e64a305c4bdab66eb24c78e46261119ff.exe
Resource
win10v2004-20220812-en
General
-
Target
4f866bf804ee8b04ce6fc9eadcf9f74e64a305c4bdab66eb24c78e46261119ff
-
Size
216KB
-
MD5
5c839e76f6febbaef1a4492d4859ef5b
-
SHA1
0055838dfb88d401a59eb98dbc1807341a36b1f9
-
SHA256
4f866bf804ee8b04ce6fc9eadcf9f74e64a305c4bdab66eb24c78e46261119ff
-
SHA512
4307372a884826a8983aa5aeed83741ead09118757eb0896b795b5d84f4ad311cd2438479611fe38335673aafd57b23eb23e5ab406b1d1be6a5aa4cac389f150
-
SSDEEP
3072:2u75rJqqJJ6gg9kKxnSxN0tSYIHV/kJEUP9OwS212Zzr+MOdITpF+dHM6eMP5WDK:5ZUqr7zKxsHV/kJE8hS82Na5dIvZJI
Malware Config
Signatures
Files
-
4f866bf804ee8b04ce6fc9eadcf9f74e64a305c4bdab66eb24c78e46261119ff.exe windows x86
8dc510f6e39116fa6af59aa831711661
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalAlloc
GlobalReAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCurrentProcessId
IsDBCSLeadByte
GetLastError
GetSystemDefaultLangID
GetFileTime
FileTimeToDosDateTime
FileTimeToLocalFileTime
SetCurrentDirectoryA
GetFileAttributesA
CreateDirectoryA
RemoveDirectoryA
FindFirstFileA
FindClose
FindNextFileA
DeleteFileA
MoveFileA
GetCurrentDirectoryA
CreateFileA
CloseHandle
ReadFile
WriteFile
SetFilePointer
LockFile
UnlockFile
GetLocalTime
_lread
_llseek
CompareStringA
_lwrite
_lclose
FreeLibrary
LoadLibraryA
GetFullPathNameA
HeapFree
lstrcmpiA
GetModuleHandleA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetDriveTypeA
HeapAlloc
HeapCreate
HeapDestroy
SetHandleCount
GetFileType
GetStdHandle
GetStartupInfoA
GetCPInfo
GetACP
GetOEMCP
FreeEnvironmentStringsA
MultiByteToWideChar
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
CompareStringW
SetEnvironmentVariableA
RaiseException
SetStdHandle
HeapReAlloc
GetProcAddress
DisableThreadLibraryCalls
GetModuleFileNameA
FlushFileBuffers
lstrcpyA
GetCommandLineA
VirtualAlloc
LoadLibraryExA
user32
CharUpperA
OemToCharA
CharToOemA
advapi32
RegCloseKey
RegOpenKeyA
RegQueryValueExA
RegSetValueExA
RegDeleteKeyA
RegCreateKeyA
cmutil
CmConvertRelativePathW
ReleaseBold
CmStrCatAllocW
CmStripPathAndExtW
SzToWzWithAlloc
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 157KB - Virtual size: 344KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 23KB - Virtual size: 145KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ