Static task
static1
Behavioral task
behavioral1
Sample
4070e3e8418523aa165023edb788cb90e45806d68bf1500393dc52f14aa8c0ac.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4070e3e8418523aa165023edb788cb90e45806d68bf1500393dc52f14aa8c0ac.exe
Resource
win10v2004-20220812-en
General
-
Target
4070e3e8418523aa165023edb788cb90e45806d68bf1500393dc52f14aa8c0ac
-
Size
321KB
-
MD5
6bb0845adfb62fcb800dbb81679a6fed
-
SHA1
0952d854a90877b615cdb1f84695f890ae819c61
-
SHA256
4070e3e8418523aa165023edb788cb90e45806d68bf1500393dc52f14aa8c0ac
-
SHA512
27455a50507fc8aaa0ae0147013cfac1b7ac9692b02d92b1c295a3b23e8165167dbf4993a58e721f19a2cc58611af0cde14fba63d245073e33fceaaeaf0008cb
-
SSDEEP
6144:5oeGbI79BUTAkIwxEV1fuk/T/tStpRmUuYHnvJI2O6hQHWJk:qeG079BUTAkIwxEV1fukGH3EWJk
Malware Config
Signatures
Files
-
4070e3e8418523aa165023edb788cb90e45806d68bf1500393dc52f14aa8c0ac.exe windows x86
d0f421427cc0b18d20ef39de0e2bf5ae
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mpr
WNetEnumResourceW
WNetCloseEnum
WNetOpenEnumW
netapi32
NetShareAdd
kernel32
CreateFileW
WriteFile
WideCharToMultiByte
Sleep
GetTickCount
FindFirstFileA
GetSystemTime
CopyFileA
CreateDirectoryW
SetCurrentDirectoryW
GetDriveTypeA
MultiByteToWideChar
LockFile
GetFileSize
GetCurrentDirectoryW
MoveFileW
FindNextFileW
FindClose
GlobalAlloc
GlobalFree
SetProcessShutdownParameters
GetCommandLineA
GetFileAttributesExW
WriteConsoleA
SetStdHandle
GetLocaleInfoA
CloseHandle
WaitForSingleObject
CreateMutexW
SetFileAttributesW
CopyFileW
GetCommandLineW
GetEnvironmentVariableW
ReleaseMutex
CreateThread
GetConsoleOutputCP
WriteConsoleW
CreateFileA
FindFirstFileW
GetCurrentProcess
GetStringTypeW
GetStringTypeA
RtlUnwind
InitializeCriticalSection
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoW
TerminateProcess
FlushFileBuffers
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetLastError
GetProcAddress
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
ExitProcess
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
VirtualAlloc
HeapReAlloc
SetFilePointer
GetConsoleCP
GetConsoleMode
CompareStringA
CompareStringW
SetEnvironmentVariableA
LoadLibraryA
user32
GetDC
SystemParametersInfoW
MessageBoxW
FindWindowW
DrawTextW
gdi32
DeleteObject
SetTextColor
SetBkColor
SelectObject
CreateFontW
DeleteDC
advapi32
RegSetValueExW
RegQueryValueExW
RegQueryValueExA
RegCloseKey
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegDeleteValueA
shell32
ShellExecuteW
CommandLineToArgvW
ole32
CoCreateInstance
CoUninitialize
CoInitialize
Sections
.text Size: 56KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 20KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ